-
2
-
-
84866390019
-
Role of middleware for Internet of things: A study
-
August
-
S.Bandyopadhyay, M.Sengupta, S. Maiti and S. Dutta "Role of middleware for Internet of things: a study, " International Journal of Computer Science & Engineering Survey (IJCSES) vol.2, no.3, August 2011.
-
(2011)
International Journal of Computer Science & Engineering Survey (IJCSES)
, vol.2
, Issue.3
-
-
Bandyopadhyay, S.1
Sengupta, M.2
Maiti, S.3
Dutta, S.4
-
3
-
-
84255177490
-
-
Springer LNEE
-
A. Ukil, J. Sen, and S. Ghosh, "An Efficient Distribution Sensitive Privacy for Real-Time Applications, " Springer LNEE, vol. 114, pp. 81 - 91, 2012.
-
(2012)
An Efficient Distribution Sensitive Privacy for Real-Time Applications
, vol.114
, pp. 81-91
-
-
Ukil, A.1
Sen, J.2
Ghosh, S.3
-
4
-
-
84859221764
-
Small domain randomization: Same privacy, more utility
-
September
-
R. Chaytor and K.Wang, "Small domain randomization: same privacy, more utility", Proceedings of the VLDB Endowment, vol: 3, Issue: 1-2, September 2010.
-
(2010)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1-2
-
-
Chaytor, R.1
Wang, K.2
-
6
-
-
84882724877
-
Microdata Protection
-
Springer
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati, "Microdata Protection", Secure Data Management in Decentralized Systems, Springer, 2007.
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
7
-
-
84879805106
-
-
Available from Cisco at, (accessed on 10 May, 2012
-
Cisco Satellite Solutions (IRIS), Available from Cisco at http://www.cisco.com/web/strategy/government/space-routing.html (accessed on 10 May, 2012).
-
Cisco Satellite Solutions (IRIS)
-
-
-
8
-
-
84969931080
-
On the impossibility of cryptography alone for privacy-preserving cloud computing
-
M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing", USENIX conference on Hot topics in security, 2010.
-
(2010)
USENIX Conference on Hot Topics in Security
-
-
Dijk, M.V.1
Juels, A.2
-
9
-
-
84877727033
-
The internet of things: How the next evolution of the internet is changing everything
-
April
-
D. Evans, "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, " CISCO Whitepaper, April, 2011.
-
(2011)
CISCO Whitepaper
-
-
Evans, D.1
-
11
-
-
84879832519
-
-
Available from IBM at, (accessed on 10 May, 2012
-
IBM Smarter Planet, Available from IBM at http://www.ibm.com/ smarterplanet/us/en/(accessed on 10 May, 2012).
-
IBM Smarter Planet
-
-
-
12
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and Jo. Gehrke, "Injecting utility into anonymized datasets, " ACM SIGMOD, pp. 217 - 228, 2006.
-
(2006)
ACM SIGMOD
, pp. 217-228
-
-
Kifer, D.1
Gehrke, Jo.2
-
14
-
-
84861611480
-
Security and privacy challenges in the internet of things
-
Kassel, Germany, March
-
C. Mayer, "Security and Privacy Challenges in the Internet of Things, " KiVS Workshop on Global Sensor Networks (GSN09), Kassel, Germany, March 2009.
-
(2009)
KiVS Workshop on Global Sensor Networks (GSN09)
-
-
Mayer, C.1
-
16
-
-
84879834003
-
-
Available from the Wikipedia at, (accessed on 10 May, 2012
-
Wikipedia, AlertMe, Available from the Wikipedia at http://en.wikipedia. org/wiki/AlertMe (accessed on 10 May, 2012).
-
AlertMe
-
-
-
17
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Wai-Chee Fu. "Utility-based anonymization using local recoding, " ACM SIGKDD, pp. 785 - 790, 2006.
-
(2006)
ACM SIGKDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
-
19
-
-
83755197918
-
Embedded security for Internet of things
-
A. Ukil, J. Sen, and S. Koilakonda, "Embedded security for Internet of things, " IEEE NCETACS, pp. 1- 6, 2011.
-
(2011)
IEEE NCETACS
, pp. 1-6
-
-
Ukil, A.1
Sen, J.2
Koilakonda, S.3
|