-
2
-
-
84933040528
-
Cloud assisted HetNets toward 5G wireless networks
-
Jun
-
N. Zhang, N. Cheng, A. T. Gamage, K. Zhang, J. W. Mark, and X. Shen, "Cloud assisted HetNets toward 5G wireless networks," IEEE Commun. Mag., vol. 53, no. 6, pp. 59-65, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 59-65
-
-
Zhang, N.1
Cheng, N.2
Gamage, A.T.3
Zhang, K.4
Mark, J.W.5
Shen, X.6
-
3
-
-
84870983755
-
Generations of mobile wireless technology: A survey
-
M. R. Bhalla and A. V. Bhalla, "Generations of mobile wireless technology: A survey," Int. J. Comput. Appl., vol. 5, no. 4, pp. 26-32, 2010.
-
(2010)
Int. J. Comput. Appl.
, vol.5
, Issue.4
, pp. 26-32
-
-
Bhalla, M.R.1
Bhalla, A.V.2
-
4
-
-
84943739624
-
The tactile Internet IoT, 5G and cloud on steroids
-
Mar
-
M. Dohler, "The tactile Internet IoT, 5G and cloud on steroids," in Proc. IET Conf., Mar. 2015, pp. 1-16.
-
(2015)
Proc. IET Conf
, pp. 1-16
-
-
Dohler, M.1
-
5
-
-
85010619421
-
Performance modeling and optimization of -exible QoS-guaranteed multifunctional MAC for rural pro-table ubiquitous 5G IoT/M2M systems
-
Nov.
-
A. Loshkarev and A. Markhasin, "Performance modeling and optimization of -exible QoS-guaranteed multifunctional MAC for rural pro-table ubiquitous 5G IoT/M2M systems," presented at the Int. Conf. Inf. Sci. Commun. Technol., Nov. 2016, pp. 1-5.
-
(2016)
The Int. Conf. Inf. Sci. Commun. Technol.
, pp. 1-5
-
-
Loshkarev, A.1
Markhasin, A.2
-
6
-
-
84912039280
-
A cloud-storage RFID location tracking system
-
Jul
-
Y.-L. Lai and J. Cheng, "A cloud-storage RFID location tracking system," IEEE Trans. Magn., vol. 50, no. 7, Jul. 2014, Art. no. 3501004.
-
(2014)
IEEE Trans. Magn.
, vol.50
, Issue.7
-
-
Lai, Y.-L.1
Cheng, J.2
-
7
-
-
84953726416
-
Information centric networking in IoT scenarios: The case of a smart home
-
Jun
-
M. Amadeo, C. Campolo, A. Iera, and A. Molinaro, "Information centric networking in IoT scenarios: The case of a smart home," presented at the IEEE Int. Conf. Commun., Jun. 2015, pp. 648-653.
-
(2015)
IEEE Int. Conf. Commun
, pp. 648-653
-
-
Amadeo, M.1
Campolo, C.2
Iera, A.3
Molinaro, A.4
-
8
-
-
85192116965
-
Usable access control enabled by sensing enterprise architectures
-
M. Uriarte et al., "Usable access control enabled by sensing enterprise architectures," in Proc. 6th Workshop Enterprise Interoperability, 2015, pp. 1-10.
-
(2015)
Proc. 6th Workshop Enterprise Interoperability
, pp. 1-10
-
-
Uriarte, M.1
-
9
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
Jan
-
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Comput. Netw., vol. 76, pp. 146-164, Jan. 2015.
-
(2015)
Comput. Netw.
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
10
-
-
84923927975
-
Attribute-based access control
-
Feb
-
V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, "Attribute-based access control," Computer, vol. 48, no. 2, pp. 85-88, Feb. 2015.
-
(2015)
Computer
, vol.48
, Issue.2
, pp. 85-88
-
-
Hu, V.C.1
Kuhn, D.R.2
Ferraiolo, D.F.3
-
11
-
-
84893561510
-
Guide to attribute based access control (ABAC) de- nition and considerations (draft)
-
V. C. Hu et al., "Guide to attribute based access control (ABAC) de- nition and considerations (draft)," NIST Special Pub., vol. 800, no. 162, pp. 15-26, 2013.
-
(2013)
NIST Special Pub.
, vol.800
, Issue.162
, pp. 15-26
-
-
Hu, V.C.1
-
12
-
-
84908332324
-
LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment
-
Sep
-
F. Li, Y. Rahulamathavan, and M. Rajarajan, "LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment," in Proc. IEEE 39th Annu. IEEE Conf. Local Comput. Netw., Sep. 2014, pp. 354-361.
-
(2014)
Proc. IEEE 39th Annu. IEEE Conf. Local Comput. Netw
, pp. 354-361
-
-
Li, F.1
Rahulamathavan, Y.2
Rajarajan, M.3
-
13
-
-
84904513885
-
A lightweight access control mechanism for mobile cloud computing
-
Apr./May
-
X. Yao, X. Han, and X. Du, "A lightweight access control mechanism for mobile cloud computing," in Proc. IEEE Conf. Comput. Commun. Workshops, Apr./May 2014, pp. 380-385.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 380-385
-
-
Yao, X.1
Han, X.2
Du, X.3
-
14
-
-
84921416301
-
LIVE: Lightweight integrity veri-cation and content access control for named data networking
-
Feb
-
Q. Li, X. Zhang, Q. Zheng, R. Sandhu, and X. Fu, "LIVE: Lightweight integrity veri-cation and content access control for named data networking," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 308-320, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 308-320
-
-
Li, Q.1
Zhang, X.2
Zheng, Q.3
Sandhu, R.4
Fu, X.5
-
15
-
-
84881510395
-
A survey on attribute-based encryption schemes of access control in cloud environments
-
Jul
-
C.-C. Lee, P.-S. Chung, and M.-S. Hwang, "A survey on attribute-based encryption schemes of access control in cloud environments," Int. J. Netw. Secur., vol. 15, no. 4, pp. 231-240, Jul. 2013.
-
(2013)
Int. J. Netw. Secur
, vol.15
, Issue.4
, pp. 231-240
-
-
Lee, C.-C.1
Chung, P.-S.2
Hwang, M.-S.3
-
17
-
-
34547273527
-
Attribute-based encryption for -ne-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B.Waters, "Attribute-based encryption for -ne-grained access control of encrypted data," in Proc. 13thACMConf. Comput. Commun. Secur., 2006, pp. 89-98.
-
(2006)
Proc. 13thACMConf. Comput. Commun. Secur
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
19
-
-
70350635850
-
A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length," in Proc. Inf. Security Pract. Exper., 2009, pp. 13-23.
-
(2009)
Proc. Inf. Security Pract. Exper
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
20
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP, 2008, pp. 579-591.
-
(2008)
Proc. ICALP
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
21
-
-
76649143738
-
Mediated ciphertext-policy attribute based encryption and its application
-
Busan, South Korea
-
L. Ibraimi et al., "Mediated ciphertext-policy attribute based encryption and its application," IN Porc. Inf. Secur. Appl., Int. Workshop (Wisa), Busan, South Korea, 2009, pp. 309-323.
-
(2009)
Porc. Inf. Secur. Appl., Int. Workshop (Wisa)
, pp. 309-323
-
-
Ibraimi, L.1
-
22
-
-
70350630621
-
Ef-cient and provable secure ciphertext-policy attribute-based encryption schemes
-
L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Ef-cient and provable secure ciphertext-policy attribute-based encryption schemes," in Proc. Inf. Secur. Pract. Exper., 2009, pp. 1-12.
-
(2009)
Proc. Inf. Secur. Pract. Exper
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
24
-
-
84983157129
-
A secure hardware module and system concept for local and remote industrial embedded system identiffcation
-
Sep
-
C. Lesjak, T. Ruprechter, J. Haid, H. Bock, and E. Brenner, "A secure hardware module and system concept for local and remote industrial embedded system identiffcation," in Proc. Emerg. Technol. Factory Autom., Sep. 2014, pp. 1-7.
-
(2014)
Proc. Emerg. Technol. Factory Autom
, pp. 1-7
-
-
Lesjak, C.1
Ruprechter, T.2
Haid, J.3
Bock, H.4
Brenner, E.5
-
25
-
-
79952097011
-
A trusted platform module for near field communication
-
Aug
-
M. Hutter and R. Toegl, "A trusted platform module for near field communication," in Proc. Int. Conf. Syst. Netw. Commun., Aug. 2010, pp. 136-141.
-
(2010)
Proc. Int. Conf. Syst. Netw. Commun
, pp. 136-141
-
-
Hutter, M.1
Toegl, R.2
-
26
-
-
84903144750
-
On middleware for emerging health services
-
J. Singh and J. M. Bacon, "On middleware for emerging health services," J. Internet Services Appl., vol. 5, no. 6, pp. 1-34, 2014.
-
(2014)
J. Internet Services Appl
, vol.5
, Issue.6
, pp. 1-34
-
-
Singh, J.1
Bacon, J.M.2
-
28
-
-
85152504598
-
Metrics-driven security objective decomposition for an e-health application with adaptive security management
-
R. M. Savola and H. Abie, "Metrics-driven security objective decomposition for an e-health application with adaptive security management," in Proc. Int. Workshop Adapt. Secur., 2013, pp. 1-6.
-
(2013)
Proc. Int. Workshop Adapt. Secur
, pp. 1-6
-
-
Savola, R.M.1
Abie, H.2
-
29
-
-
84886928358
-
Distributed capability-based access control for the internet of thing
-
J. L. Hernández-Ramos, A. J. Jara, L. Marin, and A. F. Skarmeta, "Distributed capability-based access control for the internet of thing," J. Inter- net Services Inf. Secur., vol. 3, nos. 3-4, pp. 1-16, 2013.
-
(2013)
J. Inter- Net Services Inf. Secur
, vol.3
, Issue.3-4
, pp. 1-16
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Marin, L.3
Skarmeta, A.F.4
-
30
-
-
84947488175
-
Frame-based medium access control for 5G wireless networks
-
I. K. Son, S. Mao, Y. Li, M. Chen, M. X. Gong, and T. S. Rappaport, "Frame-based medium access control for 5G wireless networks," Mobile Netw. Appl., vol. 20, no. 6, pp. 763-772, 2015.
-
(2015)
Mobile Netw. Appl
, vol.20
, Issue.6
, pp. 763-772
-
-
Son, I.K.1
Mao, S.2
Li, Y.3
Chen, M.4
Gong, M.X.5
Rappaport, T.S.6
-
31
-
-
84930944604
-
Integrated energy and spectrum harvesting for 5G wireless communications
-
May/Jun
-
Y. Liu, Y. Zhang, R. Yu, and S. Xie, "Integrated energy and spectrum harvesting for 5G wireless communications," IEEE Netw., vol. 29, no. 3, pp. 75-81, May/Jun. 2015.
-
(2015)
IEEE Netw
, vol.29
, Issue.3
, pp. 75-81
-
-
Liu, Y.1
Zhang, Y.2
Yu, R.3
Xie, S.4
-
32
-
-
84963520971
-
SCMA for downlink multiple access of 5G wireless networks
-
Dec
-
H. Nikopour et al., "SCMA for downlink multiple access of 5G wireless networks," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 3940-3945.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 3940-3945
-
-
Nikopour, H.1
-
33
-
-
84958102458
-
A survey on 5G: The next generation of mobile communication
-
Mar
-
N. Panwar, S. Sharma, and A. K. Singh, "A survey on 5G: The next generation of mobile communication," Phys. Commun., vol. 18, pp. 64-84, Mar. 2016.
-
(2016)
Phys. Commun
, vol.18
, pp. 64-84
-
-
Panwar, N.1
Sharma, S.2
Singh, A.K.3
-
34
-
-
84861589601
-
FemtoCaching: Wireless video content delivery through distributed caching helpers
-
Mar
-
N. Golrezaei, K. Shanmugam, A. G. Dimakis, A. F. Molisch, and G. Caire, "FemtoCaching: Wireless video content delivery through distributed caching helpers," in Proc. IEEE INFOCOM, Mar. 2012, pp. 1107-1115.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1107-1115
-
-
Golrezaei, N.1
Shanmugam, K.2
Dimakis, A.G.3
Molisch, A.F.4
Caire, G.5
-
36
-
-
0025383763
-
A guided tour of Chernoff bounds
-
T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, 1990.
-
(1990)
Inf. Process. Lett
, vol.33
, Issue.6
, pp. 305-308
-
-
Hagerup, T.1
Rüb, C.2
-
37
-
-
84939498664
-
Partner selection and incentive mechanism for physical layer security
-
Aug
-
N. Zhang, N. Cheng, N. Lu, X. Zhang, J. W. Mark, and X. Shen, "Partner selection and incentive mechanism for physical layer security," IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4265-4276, Aug. 2015.
-
(2015)
IEEE Trans. Wireless Commun
, vol.14
, Issue.8
, pp. 4265-4276
-
-
Zhang, N.1
Cheng, N.2
Lu, N.3
Zhang, X.4
Mark, J.W.5
Shen, X.6
-
38
-
-
84908454906
-
Sybil attacks and their defenses in the Internet of Things
-
Oct
-
K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
-
(2014)
IEEE Internet Things J
, vol.1
, Issue.5
, pp. 372-383
-
-
Zhang, K.1
Liang, X.2
Lu, R.3
Shen, X.4
-
39
-
-
84885114251
-
SmokeGrenade: An efficient key generation protocol with artificial interference
-
Nov
-
D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R.Wang, "SmokeGrenade: An efficient key generation protocol with artificial interference," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1731-1745, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1731-1745
-
-
Chen, D.1
Qin, Z.2
Mao, X.3
Yang, P.4
Qin, Z.5
Wang, R.6
-
40
-
-
85015170558
-
S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
-
Feb
-
D. Chen et al., "S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol," IEEE Internet Things J., vol. 4, no. 1, pp. 88-100, Feb. 2017, doi: 10.1109/JIOT.2016.2619679.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.1
, pp. 88-100
-
-
Chen, D.1
-
41
-
-
85019012502
-
An efficient and fine-grained big data access control scheme with privacypreserving policy
-
to be published
-
K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, and X. Shen, "An efficient and fine-grained big data access control scheme with privacypreserving policy," IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2016.2571718.
-
IEEE Internet Things J.
-
-
Yang, K.1
Han, Q.2
Li, H.3
Zheng, K.4
Su, Z.5
Shen, X.6
-
42
-
-
85192129441
-
Designated attribute-based proofs for RFID applications
-
G. Alpár, L. Batina, andW. Lueks, "Designated attribute-based proofs for RFID applications," in Proc. Int.Workshop Radio Freq. Identi-cat., Secur. Privacy, 2012, pp. 59-75.
-
(2012)
Proc. Int.Workshop Radio Freq. Identi-cat., Secur. Privacy
, pp. 59-75
-
-
Alpár, G.1
Batina, L.2
Lueks, W.3
-
43
-
-
84951305302
-
-
Sep
-
Chris Palmer. (Sep. 2014). Gradually sunsetting SHA-1. [Online]. Available: https://security.googleblog.com/2014/09/gradually-sunsettingsha- 1.html
-
(2014)
Gradually Sunsetting SHA-1
-
-
Palmer, C.1
-
45
-
-
84979256201
-
5G and the Fog-Survey of related technologies and research directions
-
Apr
-
S. Kitanov, E. Monteiro, and T. Janevski, "5G and the Fog-Survey of related technologies and research directions," in Proc. 18th Medit. Electrotechn. Conf., Apr. 2016, pp. 1-6.
-
(2016)
Proc. 18th Medit. Electrotechn. Conf
, pp. 1-6
-
-
Kitanov, S.1
Monteiro, E.2
Janevski, T.3
-
46
-
-
84966644040
-
Analysis of fog model considering computing and communication latency in 5G cellular networks
-
Mar
-
K. Intharawijitr, K. Iida, and H. Koga, "Analysis of fog model considering computing and communication latency in 5G cellular networks," in Proc. IEEE Int. Conf. Pervas. Comput. Commun.Workshops, Mar. 2016, pp. 1-4.
-
(2016)
Proc. IEEE Int. Conf. Pervas. Comput. Commun. Workshops
, pp. 1-4
-
-
Intharawijitr, K.1
Iida, K.2
Koga, H.3
-
47
-
-
84914817681
-
Ubiquitous shift with information centric network caching using fog computing
-
Cham, Switzerland, Springer
-
I. Abdullahi, S. Arif, and S. Hassan, "Ubiquitous shift with information centric network caching using fog computing," in Computational Intelligence in Information Systems. Cham, Switzerland: Springer, 2015, pp. 327-335.
-
(2015)
Computational Intelligence in Information Systems
, pp. 327-335
-
-
Abdullahi, I.1
Arif, S.2
Hassan, S.3
-
48
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data, 2015, pp. 37-42.
-
(2015)
Proc. Workshop Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
|