-
1
-
-
84879812076
-
An identity based encryption using elliptic curve cryptography for secure m2m communication
-
B. S. Adiga, P. Balamuralidhar, M. A. Rajan, R. Shastry, and V. L. Shivraj, "An Identity Based Encryption Using Elliptic Curve Cryptography for Secure M2M Communication," in Proceedings of the First International Conference on Security of Internet of Things, ser. SecurIT '12. ACM, 2012, pp. 68-74.
-
(2012)
Proceedings of the First International Conference on Security of Internet of Things, Ser. SecurIT 12. ACM
, pp. 68-74
-
-
Adiga, B.S.1
Balamuralidhar, P.2
Rajan, M.A.3
Shastry, R.4
Shivraj, V.L.5
-
2
-
-
84902970149
-
A Ubiquitous sensor network platform for integrating smart devices into the semantic sensor web
-
D. Díaz Pardo de Vera, Á.Siguënza Izquierdo, J. Bernat Vercher, and L. A. Hernández Gómez, "A Ubiquitous sensor network platform for integrating smart devices into the semantic sensor web," vol. 14, no. 6. Multidisciplinary Digital Publishing Institute, 2014, pp. 10 725-10 752.
-
(2014)
Multidisciplinary Digital Publishing Institute
, vol.14
, Issue.6
, pp. 10725-10752
-
-
Díaz, D.1
De Vera, P.2
Izquierdo, A.S.3
Vercher, J.B.4
Gómez, L.A.H.5
-
3
-
-
84906994292
-
Performance evaluation of attribute-based encryption: Toward data privacy in the iot
-
X. Wang, J. Zhang, E. Schooler, and M. Ion, "Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT," in Communications (ICC), 2014 IEEE International Conference on, June 2014, pp. 725-730.
-
(2014)
Communications (ICC), 2014 IEEE International Conference On, June
, pp. 725-730
-
-
Wang, X.1
Zhang, J.2
Schooler, E.3
Ion, M.4
-
4
-
-
84906997304
-
-
Ph. D. dissertation, University of Trento, Italy, May
-
M. Ion, "Security of Publish/Subscribe Systems," Ph.D. dissertation, University of Trento, Italy, May 2013.
-
(2013)
Security of Publish/Subscribe Systems
-
-
Ion, M.1
-
6
-
-
84872787270
-
Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks
-
Davis, Ernesto García and Calveras, Anna and Demirkol, Ilker, "Improving packet delivery performance of publish/subscribe protocols in wireless sensor networks," vol. 13, no. 1. Multidisciplinary Digital Publishing Institute, 2013, pp. 648-680.
-
(2013)
Multidisciplinary Digital Publishing Institute
, vol.13
, Issue.1
, pp. 648-680
-
-
Davis, E.G.1
Calveras, An.2
Demirkol, I.3
-
7
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based Encryption for Fine-grained Access Control of Encrypted Data," in Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS '06, 2006, pp. 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, Ser. CCS 06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Washington, DC, USA
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP '07, Washington, DC, USA, 2007, pp. 321-334.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, Ser. SP 07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
9
-
-
84869830676
-
P3S: A privacy preserving publish-subscribe middleware
-
P. Pal, G. Lauer, J. Khoury, N. Hoff, and J. Loyall, "P3S: A Privacy Preserving Publish-subscribe Middleware," in Proceedings of the 13th International Middleware Conference, ser. Middleware '12, pp. 476-495.
-
Proceedings of the 13th International Middleware Conference, Ser. Middleware 12
, pp. 476-495
-
-
Pal, P.1
Lauer, G.2
Khoury, J.3
Hoff, N.4
Loyall, J.5
-
10
-
-
84878346477
-
Supporting publication and subscription confidentiality in pub/sub networks
-
M. Ion, G. Russello, and B. Crispo, "Supporting Publication and Subscription Confidentiality in Pub/Sub Networks," in Security and Privacy in Communication Networks, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 50, 2010, pp. 272-289.
-
(2010)
Security and Privacy in Communication Networks, Ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.50
, pp. 272-289
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
11
-
-
84946916837
-
Non-functional requirements in publish/subscribe systems
-
Germany, August
-
M. A. Tariq, "Non-functional Requirements in Publish/Subscribe Systems," Ph.D. dissertation, Universität Stuttgart, Fakultät Informatik, Elektrotechnik und Informationstechnik, Germany, August 2013.
-
(2013)
Ph. D. Dissertation, Universität Stuttgart, Fakultät Informatik, Elektrotechnik und Informationstechnik
-
-
Tariq, M.A.1
-
12
-
-
24944554962
-
Fuzzy identity-based encryption
-
Berlin, Heidelberg
-
A. Sahai and B. Waters, "Fuzzy Identity-based Encryption," in Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT'05, Berlin, Heidelberg, 2005, pp. 457-473.
-
(2005)
Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, Ser. EUROCRYPT 05
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
13
-
-
84901044821
-
Lightweight ibe scheme for wireless sensor nodes
-
Dec
-
B. S. Adiga, M. A. Rajan, R. Shastry, V. L. Shivraj, and P. Balamuralidhar, "Lightweight IBE scheme for Wireless Sensor nodes," in Advanced Networks and Telecommuncations Systems (ANTS), 2013 IEEE International Conference on, Dec 2013, pp. 1-6.
-
(2013)
Advanced Networks and Telecommuncations Systems (ANTS), 2013 IEEE International Conference on
, pp. 1-6
-
-
Adiga, B.S.1
Rajan, M.A.2
Shastry, R.3
Shivraj, V.L.4
Balamuralidhar, P.5
-
14
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based Encryption with Non-monotonic Access Structures," in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07, 2007, pp. 195-203.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Ser. CCS 07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
|