-
1
-
-
78650921155
-
From today's INTRAnet of things to a future INTERnet of things: A wireless-and mobility related view
-
M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, "From today's INTRAnet of things to a future INTERnet of things: A wireless-and mobility related view", IEEE Wireless Communication, vol. 17, no. 6, pp. 44-51, 2010.
-
(2010)
IEEE Wireless Communication
, vol.17
, Issue.6
, pp. 44-51
-
-
Zorzi, M.1
Gluhak, A.2
Lange, S.3
Bassi, A.4
-
2
-
-
84886590860
-
-
Available online at
-
Libelium Unveils the Top 50 Internet of Things Applications, Available online at: http://www. itwire. com/ opinion-and-analysis/ beerfiles/54432- libeliumunveils-the-top-50-internet-of-things applications.
-
Libelium Unveils the Top 50 Internet of Things Applications
-
-
-
3
-
-
80955160447
-
That 'internet of things' thing
-
K. Ashton, "That 'Internet of Things' Thing", RFID Journal, Available at: www. rfidjournal. com/article/print/4986,2009.
-
(2009)
RFID Journal
-
-
Ashton, K.1
-
4
-
-
82955227970
-
From internet of things towards cloud of things
-
ISBN: 978-1-4577-1385-9,DOI: 10. 1109/ ICCCT. 2011. 6075156
-
P. Parwekar,"From Internet of Things towards cloud of things", 2nd International Conference on Computer and Communication Technology (ICCCT), 2011, ISBN: 978-1-4577-1385-9,DOI: 10. 1109/ ICCCT. 2011. 6075156,pp. 329-333.
-
(2011)
2nd International Conference on Computer and Communication Technology (ICCCT)
, pp. 329-333
-
-
Parwekar, P.1
-
7
-
-
79751511212
-
Whats new about cloud computing security
-
EECS Department, University of California, Berkeley
-
Y. Chen, V. Paxson, RH. Katz, "Whats new about cloud computing security," Tech. Rep. UCB/EECS-2010-5, EECS Department, University of California, Berkeley, 2010.
-
(2010)
Intech. Rep. UCB/EECS-2010-5
-
-
Chen, Y.1
Paxson, V.2
Katz, R.H.3
-
9
-
-
78349299500
-
The management of security in cloud computing
-
S. Ramgovind, MM. Eloff, E. Smith, "The Management of Security in Cloud Computing," Information Security for South Africa (ISSA), IEEE, 2010.
-
(2010)
Formation Security for South Africa (ISSA), IEEE
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
11
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Elsevier
-
S. V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications, Elsevier, vol. 34, 2011, pp. 1-11.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, pp. 1-11
-
-
Kavitha, S.V.1
-
12
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
New York, NY, USA: ACM
-
Juels, B. S. Kaliski, "Pors: proofs of retrievability for large files", In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, USA: ACM, 2007, pp. 584-597.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, K.B.S.1
-
14
-
-
33947266432
-
Implementing network security protocols based on elliptic curve cryptography
-
Istanbul, Turkey, May 20-21
-
Aydos, Savas, Koc, "Implementing Network Security Protocols based on Elliptic Curve Cryptography", Proceedings of the Fourth Symposium on Computer Networks (Istanbul, Turkey, May 20-21, 1999),pp: 130-139.
-
(1999)
Proceedings of the Fourth Symposium on Computer Networks
, pp. 130-139
-
-
Aydos1
Savas2
Koc3
-
15
-
-
34648859668
-
A Public-Key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, California; October
-
David, Malan, Matt, Welsh, Michael, Smith, " A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography",In Proc. First IEEE International Conference on Sensor and Ad Hoc Communications and Networks (Santa Clara, California; October 2004).
-
(2004)
Proc. First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
-
-
David, M.1
Matt, W.2
Michael, S.3
-
16
-
-
84879831235
-
Lightweight cryptography for the internet of things
-
March-2011
-
Katagi, Masanobu,Moriai, Shiho,2011, "Lightweight Cryptography for the Internet of Things". ISO/IEC standard (RFC6114, March-2011).
-
(2011)
ISO/IEC Standard
, vol.RFC6114
-
-
Katagi1
Masanobu2
Moriai3
Shiho4
-
17
-
-
84886589663
-
-
Available at: nordsecmob. aalto. fi/ en/publications/theses-2012/sethi- mohit-thesis. pdf,2012
-
M. Sethi, "Security in Smart object Networks", Available at: nordsecmob. aalto. fi/ en/publications/theses-2012/sethi-mohit-thesis. pdf,2012.
-
Security in Smart Object Networks
-
-
Sethi, M.1
-
18
-
-
84894494954
-
-
IEEE P1636. 3/D1, 2008, Draft Standard for
-
IEEE P1636. 3/D1, 2008, Draft Standard for " Identity-based Public-key Cryptography using Pairings", DOI:http://grouper. ieee. org/ groups/1363/IBC/material/P1363. 3-D1-200805. pdf.
-
Identity-based Public-key Cryptography Using Pairings
-
-
-
19
-
-
71749113079
-
Identity-Based authentication for cloud computing
-
SpringerVerlag, Beijing, China
-
H. Li, Y. Dai, L. Tian, H. Yang, "Identity-Based Authentication for Cloud Computing", In CloudCom '09: Proceedings of the 1st International Conference on Cloud Computing, pp 157-166, SpringerVerlag,2009, Beijing, China.
-
(2009)
CloudCom '09: Proceedings of the 1st International Conference on Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag, 196
-
A. Shamir,"Identity-based cryptosystems and signature schemes", Advances in Cryptology-Crypto '84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, 196,1984, pp. 47-53.
-
(1984)
Advances in Cryptology-Crypto '84, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
69549116775
-
Identity-Based anonymous remote authentication for Value-Added services in mobile networks
-
J. Y. Sun, C. Z, Y. C. Zhang,Y. G. Fang, "Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks", IEEE Transactions on Vehicular Technology, vol. 58, no. 7, pp. 3508-3517, 2009.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.7
, pp. 3508-3517
-
-
Sun, J.Y.1
Zhang, Y.C.2
Fang, Y.G.3
-
22
-
-
84894480836
-
An identity based encryption using elliptic curve cryptography for secure m2m communication
-
R. Shastry, P. Balamuralidhar,B. S. Adiga,Rajan M A, "An Identity based Encryption using Elliptic Curve Cryptography for Secure M2M Communication", SECURIT2012-First International Conference on Security of Internet of Things,2012.
-
(2012)
SECURIT2012-First International Conference on Security of Internet of Things
-
-
Shastry, R.1
Balamuralidhar, P.2
Adiga, B.S.3
Rajan, M.A.4
-
23
-
-
11244267013
-
-
Springer Verlog, New york NY
-
D. Hankerson, A. Menezes, S. Vanstone, "Guide to Elliptic Curve Cryptography", Springer Verlog, New york NY, 2003.
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
25
-
-
80054066376
-
Trust as a service: A framework for trust management in cloud environments
-
ISBN:978-3-642-24433-9,DOI: 10. 1007/978-3-642-24434-6-27
-
"Trust as a Service: A Framework for Trust Management in Cloud Environments", Web Information System Engineering-WISE 2011, pp. 314-321, ISBN:978-3-642-24433-9,DOI: 10. 1007/978-3-642-24434-6-27.
-
(2011)
Web Information System Engineering-WISE
, pp. 314-321
-
-
-
26
-
-
78651507681
-
Towards integrity measurement in virtualized environments - A hypervisor based sensory integrity measurement architecture (SIMA)
-
November
-
B. Stelte, R. Koch, M. Ullmann, "Towards integrity measurement in virtualized environments - A hypervisor based sensory integrity measurement architecture (SIMA)", Technologies for Homeland Security (HST), 2010 IEEE International Conference, November 2010.
-
(2010)
Intechnologies for Homeland Security (HST), 2010 IEEE International Conference
-
-
Stelte, B.1
Koch, R.2
Ullmann, M.3
|