-
1
-
-
85058474737
-
Systems computing challenges in the internet of things
-
Alur, R., Berger, E., Drobnis, A.W., Fix, L., Fu, K., Hager, G.D., Lopresti, D., Nahrstedt, K., Mynatt, E., Patel, S., et al. Systems computing challenges in the internet of things. arXiv preprint arXiv:160402980, 2016.
-
(2016)
arXiv preprint arXiv:160402980
-
-
Alur, R.1
Berger, E.2
Drobnis, A.W.3
Fix, L.4
Fu, K.5
Hager, G.D.6
Lopresti, D.7
Nahrstedt, K.8
Mynatt, E.9
Patel, S.10
-
2
-
-
0004185138
-
Fundamentals of computer security technology
-
Prentice-Hall Inc.
-
Amoroso, E.G., Fundamentals of computer security technology. 1994, Prentice-Hall Inc.
-
(1994)
-
-
Amoroso, E.G.1
-
3
-
-
85032264259
-
Blockchain platform for industrial internet of things
-
Bahga, A., Madisetti, V.K., Blockchain platform for industrial internet of things. J Softw Eng Appl, 9(10), 2016, 533.
-
(2016)
J Softw Eng Appl
, vol.9
, Issue.10
, pp. 533
-
-
Bahga, A.1
Madisetti, V.K.2
-
4
-
-
84963573044
-
Proof of activity: extending bitcoin's proof of work via proof of stake
-
Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M., Proof of activity: extending bitcoin's proof of work via proof of stake. ACM SIGMETRICS Perform Eval Rev 42:3 (2014), 34–37.
-
(2014)
ACM SIGMETRICS Perform Eval Rev
, vol.42
, Issue.3
, pp. 34-37
-
-
Bentov, I.1
Lee, C.2
Mizrahi, A.3
Rosenfeld, M.4
-
5
-
-
85049745369
-
Bitcoin developer guide
-
Bitcoin
-
Bitcoin, Bitcoin developer guide. Technical Report, 2017, Bitcoin.
-
(2017)
Technical Report
-
-
Bitcoin1
-
6
-
-
84882998313
-
Securing the smart grid with hardware security modules
-
Springer
-
Bong, D., Philipp, A., Securing the smart grid with hardware security modules. ISSE 2012 securing electronic business processes, 2012, Springer, 128–136.
-
(2012)
ISSE 2012 securing electronic business processes
, pp. 128-136
-
-
Bong, D.1
Philipp, A.2
-
7
-
-
0001038609
-
Practical byzantine fault tolerance
-
Castro, M., Liskov, B., et al. Practical byzantine fault tolerance. Proceedings of symposium on operating system design and implementation, OSDI, 99, 1999, 173–186.
-
(1999)
Proceedings of symposium on operating system design and implementation, OSDI
, vol.99
, pp. 173-186
-
-
Castro, M.1
Liskov, B.2
-
8
-
-
84880064818
-
Third-round report of the sha-3 cryptographic hash algorithm competition
-
NIST
-
Chang, S.j., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E., Third-round report of the sha-3 cryptographic hash algorithm competition. NIST Interagency Report 7896, 2012, NIST.
-
(2012)
NIST Interagency Report 7896
-
-
Chang, S.J.1
Perlner, R.2
Burr, W.E.3
Turan, M.S.4
Kelsey, J.M.5
Paul, S.6
Bassham, L.E.7
-
9
-
-
84979828304
-
Blockchains and smart contracts for the internet of things
-
Christidis, K., Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292–2303.
-
(2016)
IEEE Access
, vol.4
, pp. 2292-2303
-
-
Christidis, K.1
Devetsikiotis, M.2
-
10
-
-
84947730530
-
On the performance of signature schemes based on elliptic curves
-
Springer
-
De Win, E., Mister, S., Preneel, B., Wiener, M., On the performance of signature schemes based on elliptic curves. Proceedings of international algorithmic number theory symposium, 1998, Springer, 252–266.
-
(1998)
Proceedings of international algorithmic number theory symposium
, pp. 252-266
-
-
De Win, E.1
Mister, S.2
Preneel, B.3
Wiener, M.4
-
11
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D., Yao, A., On the security of public key protocols. IEEE Trans Inf Theory 29:2 (1983), 198–208.
-
(1983)
IEEE Trans Inf Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
85049734378
-
Blockchain in internet of things: challenges and solutions
-
Dorri, A., Kanhere, S.S., Jurdak, R., Blockchain in internet of things: challenges and solutions. arXiv preprint arXiv:160805187, 2016.
-
(2016)
arXiv preprint arXiv:160805187
-
-
Dorri, A.1
Kanhere, S.S.2
Jurdak, R.3
-
13
-
-
85019031448
-
Blockchain for iot security and privacy: the case study of a smart home
-
IEEE
-
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P., Blockchain for iot security and privacy: the case study of a smart home. Proceedings of the 2017 IEEE international conference on pervasive computing and communications workshops, PerCom Workshops, 2017, IEEE, 618–623.
-
(2017)
Proceedings of the 2017 IEEE international conference on pervasive computing and communications workshops, PerCom Workshops
, pp. 618-623
-
-
Dorri, A.1
Kanhere, S.S.2
Jurdak, R.3
Gauravaram, P.4
-
15
-
-
85049751437
-
-
Ethereum community. Ethereum homestead documentation. Online
-
Ethereum community. Ethereum homestead documentation. Online http://wwwethdocsorg/en/latest/indexhtml 2016.
-
(2016)
-
-
-
16
-
-
85049750290
-
-
Ethereum community. Ethash. Etherium, wiki
-
Ethereum community. Ethash. Etherium, wiki https://githubcom/ethereum/wiki/wiki/Ethash 2017.
-
(2017)
-
-
-
17
-
-
85049755625
-
Ethereum development tutorial
-
Ethereum
-
Ethereum, Ethereum development tutorial. Technical Report, 2017, Ethereum.
-
(2017)
Technical Report
-
-
Ethereum1
-
18
-
-
85049740821
-
-
Ethereum foundation. Solidity documentation;
-
Ethereum foundation. Solidity documentation; 2017.
-
(2017)
-
-
-
19
-
-
85049759235
-
-
Fast Ethereum RPC client for testing and development. Online Test RPC
-
Fast Ethereum RPC client for testing and development. Online Test RPC https://githubcom/ethereumjs/testrpc 2015.
-
(2015)
-
-
-
20
-
-
0002262722
-
Role-based access control (rbac): features and motivations
-
Ferraiolo, D., Cugini, J., Kuhn, D.R., Role-based access control (rbac): features and motivations. Proceedings of 11th annual computer security application conference, 1995, 241–248.
-
(1995)
Proceedings of 11th annual computer security application conference
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, D.R.3
-
21
-
-
0003584029
-
FIPS PUB 140–2. security requirements for cryptographic modules
-
Federal Information Processing Standards Publication
-
FIPS PUB, FIPS PUB 140–2. security requirements for cryptographic modules. 2001, Federal Information Processing Standards Publication.
-
(2001)
-
-
FIPS PUB1
-
22
-
-
84991661613
-
Using genetic algorithm for advanced municipal waste collection in smart city
-
IEEE
-
Fujdiak, R., Masek, P., Mlynek, P., Misurec, J., Olshannikova, E., Using genetic algorithm for advanced municipal waste collection in smart city. Proceedings of 2016 10th international symposium on communication systems, networks and digital signal processing, CSNDSP, 2016, IEEE, 1–6.
-
(2016)
Proceedings of 2016 10th international symposium on communication systems, networks and digital signal processing, CSNDSP
, pp. 1-6
-
-
Fujdiak, R.1
Masek, P.2
Mlynek, P.3
Misurec, J.4
Olshannikova, E.5
-
23
-
-
84992406684
-
Gartner says by 2020, more than half of major new business processes and systems will incorporate some element of the internet of things
-
Gartner, Inc
-
Gartner, Gartner says by 2020, more than half of major new business processes and systems will incorporate some element of the internet of things. Technical Report, 2016, Gartner, Inc.
-
(2016)
Technical Report
-
-
Gartner1
-
24
-
-
84901424155
-
A factorial space for a system-based detection of botcloud activity
-
IEEE
-
Hammi, B., Khatoun, R., Doyen, G., A factorial space for a system-based detection of botcloud activity. Proceedings of 2014 6th international conference on new technologies, mobility and security, NTMS, 2014, IEEE, 1–5.
-
(2014)
Proceedings of 2014 6th international conference on new technologies, mobility and security, NTMS
, pp. 1-5
-
-
Hammi, B.1
Khatoun, R.2
Doyen, G.3
-
25
-
-
85038868181
-
Internet of Things (IoT) technologies for smart cities
-
Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L., Internet of Things (IoT) technologies for smart cities. IET Netw 7:1 (2017), 1–13.
-
(2017)
IET Netw
, vol.7
, Issue.1
, pp. 1-13
-
-
Hammi, B.1
Khatoun, R.2
Zeadally, S.3
Fayad, A.4
Khoukhi, L.5
-
27
-
-
84978438157
-
Cloud-based commissioning of constrained devices using permissioned blockchains
-
ACM
-
Hardjono, T., Smith, N., Cloud-based commissioning of constrained devices using permissioned blockchains. Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security, 2016, ACM, 29–36.
-
(2016)
Proceedings of the 2nd ACM international workshop on IoT privacy, trust, and security
, pp. 29-36
-
-
Hardjono, T.1
Smith, N.2
-
28
-
-
85049753846
-
-
A dtls 1.2 profile for the internet of things. draft-ietf-dice-profile-01 (work in progress)
-
Hartke K, Tschofenig H. A dtls 1.2 profile for the internet of things. draft-ietf-dice-profile-01 (work in progress) 2014.
-
(2014)
-
-
Hartke, K.1
Tschofenig, H.2
-
29
-
-
84953407795
-
Health monitoring and management using internet-of-things (iot) sensing with cloud-based processing: opportunities and challenges
-
IEEE
-
Hassanalieragh, M., Page, A., Soyata, T., Sharma, G., Aktas, M., Mateos, G., Kantarci, B., Andreescu, S., Health monitoring and management using internet-of-things (iot) sensing with cloud-based processing: opportunities and challenges. Proceedings of the 2015 IEEE international conference on services computing, SCC, 2015, IEEE, 285–292.
-
(2015)
Proceedings of the 2015 IEEE international conference on services computing, SCC
, pp. 285-292
-
-
Hassanalieragh, M.1
Page, A.2
Soyata, T.3
Sharma, G.4
Aktas, M.5
Mateos, G.6
Kantarci, B.7
Andreescu, S.8
-
30
-
-
85018510486
-
Managing iot devices using blockchain platform
-
IEEE
-
Huh, S., Cho, S., Kim, S., Managing iot devices using blockchain platform. Proceedings of the 2017 19th international conference on advanced communication technology, ICACT, 2017, IEEE, 464–467.
-
(2017)
Proceedings of the 2017 19th international conference on advanced communication technology, ICACT
, pp. 464-467
-
-
Huh, S.1
Cho, S.2
Kim, S.3
-
31
-
-
84923037755
-
A robust authentication scheme for observing resources in the internet of things environment
-
IEEE
-
Jan, M.A., Nanda, P., He, X., Tan, Z., Liu, R.P., A robust authentication scheme for observing resources in the internet of things environment. Proceedings of the 2014 IEEE 13th international conference on trust, security and privacy in computing and communications, TrustCom, 2014, IEEE, 205–211.
-
(2014)
Proceedings of the 2014 IEEE 13th international conference on trust, security and privacy in computing and communications, TrustCom
, pp. 205-211
-
-
Jan, M.A.1
Nanda, P.2
He, X.3
Tan, Z.4
Liu, R.P.5
-
32
-
-
84874293263
-
A dtls based end-to-end security architecture for the internet of things with two-way authentication
-
IEEE
-
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., Carle, G., A dtls based end-to-end security architecture for the internet of things with two-way authentication. Proceedings of the 2012 IEEE 37th conference on local computer networks workshops, LCN workshops, 2012, IEEE, 956–963.
-
(2012)
Proceedings of the 2012 IEEE 37th conference on local computer networks workshops, LCN workshops
, pp. 956-963
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brünig, M.4
Carle, G.5
-
33
-
-
85029692903
-
Blockchain's roles in strengthening cybersecurity and protecting privacy
-
Kshetri, N., Blockchain's roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41:10 (2017), 1027–1038.
-
(2017)
Telecommun Policy
, vol.41
, Issue.10
, pp. 1027-1038
-
-
Kshetri, N.1
-
34
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter, K., The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 11:1 (2004), 62–67.
-
(2004)
IEEE Wirel Commun
, vol.11
, Issue.1
, pp. 62-67
-
-
Lauter, K.1
-
35
-
-
84921300723
-
A cyber-physical systems architecture for industry 4.0-based manufacturing systems
-
Lee, J., Bagheri, B., Kao, H.A., A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf Lett 3 (2015), 18–23.
-
(2015)
Manuf Lett
, vol.3
, pp. 18-23
-
-
Lee, J.1
Bagheri, B.2
Kao, H.A.3
-
36
-
-
85059030618
-
A survey on the security of blockchain systems
-
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q., A survey on the security of blockchain systems. Future Gener Comput Syst, 2017.
-
(2017)
Future Gener Comput Syst
-
-
Li, X.1
Jiang, P.2
Chen, T.3
Luo, X.4
Wen, Q.5
-
37
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S., A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7:2 (2005), 72–93.
-
(2005)
IEEE Commun Surv Tutor
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
38
-
-
84979530330
-
Detection of runtime conflicts among services in smart cities
-
IEEE
-
Ma, M., Preum, S.M., Tarneberg, W., Ahmed, M., Ruiters, M., Stankovic, J., Detection of runtime conflicts among services in smart cities. Proceedings of the 2016 IEEE international conference on smart computing, SMARTCOMP, 2016, IEEE, 1–10.
-
(2016)
Proceedings of the 2016 IEEE international conference on smart computing, SMARTCOMP
, pp. 1-10
-
-
Ma, M.1
Preum, S.M.2
Tarneberg, W.3
Ahmed, M.4
Ruiters, M.5
Stankovic, J.6
-
39
-
-
85049757085
-
-
How blockchain will defend iot
-
Malviya H. How blockchain will defend iot 2016.
-
(2016)
-
-
Malviya, H.1
-
40
-
-
85049753578
-
Cryptocurrencies, monetary stability and regulation
-
Mandeng, O.J., Cryptocurrencies, monetary stability and regulation. Technical Report, 2018.
-
(2018)
Technical Report
-
-
Mandeng, O.J.1
-
42
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Mirkovic, J., Reiher, P., A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput Commun Rev 34:2 (2004), 39–53.
-
(2004)
ACM SIGCOMM Comput Commun Rev
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
43
-
-
85049724863
-
-
Bitcoin: a peer-to-peer electronic cash system
-
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2008.
-
(2008)
-
-
Nakamoto, S.1
-
44
-
-
85013436140
-
Fairaccess: a new blockchain-based access control framework for the internet of things
-
Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A., Fairaccess: a new blockchain-based access control framework for the internet of things. Secur Commun Netw 9:18 (2016), 5943–5964.
-
(2016)
Secur Commun Netw
, vol.9
, Issue.18
, pp. 5943-5964
-
-
Ouaddah, A.1
Abou Elkalam, A.2
Ait Ouahman, A.3
-
45
-
-
84989913506
-
Towards a novel privacy-preserving access control model based on blockchain technology in iot
-
Springer
-
Ouaddah, A., Elkalam, A.A., Ouahman, A.A., Towards a novel privacy-preserving access control model based on blockchain technology in iot. Europe and MENA cooperation advances in information and communication technologies, 2017, Springer, 523–533.
-
(2017)
Europe and MENA cooperation advances in information and communication technologies
, pp. 523-533
-
-
Ouaddah, A.1
Elkalam, A.A.2
Ouahman, A.A.3
-
46
-
-
33746613037
-
RFC 6347: datagram transport layer security version 1.2
-
Internet Engineering Task Force (IETF)
-
Rescorla, E., Modadugu, N., RFC 6347: datagram transport layer security version 1.2. 2012, Internet Engineering Task Force (IETF).
-
(2012)
-
-
Rescorla, E.1
Modadugu, N.2
-
47
-
-
85049738018
-
-
Blockchain.;
-
Rouse M. Blockchain. http://searchcio.techtarget.com/definition/blockchain; 2015.
-
(2015)
-
-
Rouse, M.1
-
48
-
-
85049730342
-
Semantic blockchain to improve scalability in the internet of things
-
Ruta, M., Scioscia, F., Ieva, S., Capurso, G., Di Sciascio, E., Semantic blockchain to improve scalability in the internet of things. Open J Internet Things 3:1 (2017), 46–61.
-
(2017)
Open J Internet Things
, vol.3
, Issue.1
, pp. 46-61
-
-
Ruta, M.1
Scioscia, F.2
Ieva, S.3
Capurso, G.4
Di Sciascio, E.5
-
49
-
-
85059016300
-
How to make a digital currency on a blockchain stable
-
Saito, K., Iwamura, M., How to make a digital currency on a blockchain stable. arXiv preprint arXiv:180106771, 2018, 1–15.
-
(2018)
arXiv preprint arXiv:180106771
, pp. 1-15
-
-
Saito, K.1
Iwamura, M.2
-
50
-
-
84886398241
-
Smart agriculture based on cloud computing and iot
-
TongKe, F., Smart agriculture based on cloud computing and iot. J Converg Inf Technol, 8(2), 2013, 8.
-
(2013)
J Converg Inf Technol
, vol.8
, Issue.2
, pp. 8
-
-
TongKe, F.1
-
51
-
-
84956858823
-
Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination
-
Wang, S., Wan, J., Zhang, D., Li, D., Zhang, C., Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination. Comput Netw 101 (2016), 158–168.
-
(2016)
Comput Netw
, vol.101
, pp. 158-168
-
-
Wang, S.1
Wan, J.2
Zhang, D.3
Li, D.4
Zhang, C.5
-
52
-
-
85021637896
-
-
A blockchain-based storage system for data analytics in the Internet of Things; Springer International Publishing.
-
Xu Q, Aung KMM, Zhu Y, Yong KL. A blockchain-based storage system for data analytics in the Internet of Things; Springer International Publishing. p. 119–138.
-
-
-
Xu, Q.1
Aung, K.M.M.2
Zhu, Y.3
Yong, K.L.4
-
53
-
-
84908636513
-
A health-iot platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box
-
Yang, G., Xie, L., Mäntysalo, M., Zhou, X., Pang, Z., Da Xu, L., Kao-Walter, S., Chen, Q., Zheng, L.R., A health-iot platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans Ind Inform 10:4 (2014), 2180–2191.
-
(2014)
IEEE Trans Ind Inform
, vol.10
, Issue.4
, pp. 2180-2191
-
-
Yang, G.1
Xie, L.2
Mäntysalo, M.3
Zhou, X.4
Pang, Z.5
Da Xu, L.6
Kao-Walter, S.7
Chen, Q.8
Zheng, L.R.9
-
54
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W., A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11:5 (2011), 4767–4779.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
55
-
-
84928480750
-
An iot electric business model based on the protocol of bitcoin
-
IEEE
-
Zhang, Y., Wen, J., An iot electric business model based on the protocol of bitcoin. Proceedings of the 2015 18th international conference on intelligence in next generation networks, ICIN, 2015, IEEE, 184–191.
-
(2015)
Proceedings of the 2015 18th international conference on intelligence in next generation networks, ICIN
, pp. 184-191
-
-
Zhang, Y.1
Wen, J.2
-
56
-
-
84963642175
-
The iot electric business model: using blockchain technology for the internet of things
-
Zhang, Y., Wen, J., The iot electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10:4 (2017), 983–994.
-
(2017)
Peer-to-Peer Netw Appl
, vol.10
, Issue.4
, pp. 983-994
-
-
Zhang, Y.1
Wen, J.2
-
57
-
-
77958590986
-
The study and application of the iot technology in agriculture
-
IEEE
-
Zhao, J.c., Zhang, J.f., Feng, Y., Guo, J.x., The study and application of the iot technology in agriculture. Proceedings of the 2010 3rd IEEE international conference on computer science and information technology, ICCSIT, 2, 2010, IEEE, 462–465.
-
(2010)
Proceedings of the 2010 3rd IEEE international conference on computer science and information technology, ICCSIT
, vol.2
, pp. 462-465
-
-
Zhao, J.C.1
Zhang, J.F.2
Feng, Y.3
Guo, J.X.4
-
58
-
-
85049729684
-
-
Blockchain challenges and opportunities: a survey. Working Paper
-
Zheng Z, Xie S, Dai HN, Wang H. Blockchain challenges and opportunities: a survey. Working Paper 2016.
-
(2016)
-
-
Zheng, Z.1
Xie, S.2
Dai, H.N.3
Wang, H.4
|