-
1
-
-
31444440239
-
The 8 requirements of real-time stream processing
-
M. Stonebraker, U. Çetintemel, and S. Zdonik. "The 8 requirements of real-time stream processing." ACM SIGMOD Record, 34(4), 2005, pp. 42-47.
-
(2005)
ACM SIGMOD Record
, vol.34
, Issue.4
, pp. 42-47
-
-
Stonebraker, M.1
Çetintemel, U.2
Zdonik, S.3
-
2
-
-
70849105916
-
StreamShield: A stream-centric approach towards security and privacy in data stream environments
-
R. Nehme, et al. "StreamShield: a stream-centric approach towards security and privacy in data stream environments." In Proc. of ACM SIGMOD International Conference on Management of data, 2009, pp. 1027-1030.
-
(2009)
Proc. Of ACM SIGMOD International Conference on Management of Data
, pp. 1027-1030
-
-
Nehme, R.1
-
3
-
-
84869444719
-
Streamcloud: An elastic and scalable data streaming system
-
V. Gulisano, et al. "Streamcloud: An elastic and scalable data streaming system." IEEE Transactions on Parallel and Distributed Systems, 23(12), 2012, pp. 2351-2365.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2351-2365
-
-
Gulisano, V.1
-
5
-
-
85108204238
-
-
Online
-
Scyther,[Online] http://www.cs.ox.ac.uk/people/cas.cremers/scyther/
-
-
-
-
7
-
-
85108220214
-
-
accessed on: 04.08.2015
-
Contiki OS: http://www.contiki-os.org/ (accessed on: 04.08.2015).
-
-
-
-
8
-
-
84907227275
-
ID-based sensor node authentication for multi-layer sensor networks
-
S. Sung, and J. Ryou. "ID-based sensor node authentication for multi-layer sensor networks." Journal of Communications and Networks, 16(4), 2014, pp. 363-370.
-
(2014)
Journal of Communications and Networks
, vol.16
, Issue.4
, pp. 363-370
-
-
Sung, S.1
Ryou, J.2
-
9
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
H. Yeh, et al. "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography." Sensors 11(5), 2011, pp. 4767-4779.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.1
-
10
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks
-
M. Khan, and K. Alghathbar. "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'." Sensors 10(3), 2010, pp. 2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.1
Alghathbar, K.2
-
11
-
-
84967144040
-
DPBSV-an efficient and secure scheme for big sensing data stream
-
D. Puthal, et al. "DPBSV-An Efficient and Secure Scheme for Big Sensing Data Stream." In Proc. of Trustcom/BigDataSE/ISPA, vol. 1, pp. 246-253. IEEE, 2015.
-
(2015)
Proc. Of Trustcom/BigDataSE/ISPA
, vol.1
, pp. 246-253
-
-
Puthal, D.1
-
12
-
-
84962052195
-
A dynamic prime number based efficient security mechanism for big sensing data streams
-
D. Puthal, et al. "A Dynamic Prime Number Based Efficient Security Mechanism for Big Sensing Data Streams." Journal of Computer and System Sciences 83(1), 2017, pp. 22-42.
-
(2017)
Journal of Computer and System Sciences
, vol.83
, Issue.1
, pp. 22-42
-
-
Puthal, D.1
-
14
-
-
85008884270
-
DLSEf: A dynamic key length based efficient real-time security verification model for big data stream
-
D. Puthal, et al. " DLSeF: A Dynamic Key Length based Efficient Real-Time Security Verification Model for Big Data Stream." In ACM Transactions on Embedded Computing Systems (TECS), 2016.
-
(2016)
ACM Transactions on Embedded Computing Systems (TECS)
-
-
Puthal, D.1
-
17
-
-
84969917052
-
Building sensor-based big data cyberinfrastructures
-
E. Bertino, S. Nepal, and R. Ranjan. "Building Sensor-Based Big Data Cyberinfrastructures." IEEE Cloud Computing 2(5), 2015, pp. 64-69.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.5
, pp. 64-69
-
-
Bertino, E.1
Nepal, S.2
Ranjan, R.3
-
18
-
-
84961627543
-
Streaming big data processing in datacenter clouds
-
R. Ranjan. "Streaming big data processing in datacenter clouds." IEEE Cloud Computing 1(1), 2014, pp. 78-83.
-
(2014)
IEEE Cloud Computing
, vol.1
, Issue.1
, pp. 78-83
-
-
Ranjan, R.1
-
20
-
-
0003508558
-
-
PUB, NIST FIPS Federal Information Processing Standards Publication 441-0311
-
PUB, NIST FIPS. "197: Advanced encryption standard (AES)." Federal Information Processing Standards Publication 197, 2001, pp. 441-0311.
-
(2001)
197: Advanced Encryption Standard (AES)
, vol.197
-
-
-
21
-
-
73649145526
-
Advanced encryption standard (AES)
-
S. Heron. "Advanced Encryption Standard (AES)." Network Security 2009(12), 2009, pp. 8-12.
-
(2009)
Network Security
, vol.2009
, Issue.12
, pp. 8-12
-
-
Heron, S.1
-
22
-
-
85108215973
-
-
accessed on: 04.08.2015
-
www.cloudflare.com (accessed on: 04.08.2015).
-
-
-
-
25
-
-
84926246175
-
Security completeness problem in wireless sensor networks
-
RA Shaikh, S. Lee, and A. Albeshri. "Security completeness problem in wireless sensor networks." Intelligent Automation & Soft Computing 21(2), 2015, pp. 235-250.
-
(2015)
Intelligent Automation & Soft Computing
, vol.21
, Issue.2
, pp. 235-250
-
-
Shaikh, R.A.1
Lee, S.2
Albeshri, A.3
-
26
-
-
85010036045
-
A Sybil attack detection scheme for a forest wildfire monitoring application
-
MA Jan, et al. "A Sybil attack detection scheme for a forest wildfire monitoring application." In Future Generation Computer Systems, 2016.
-
(2016)
Future Generation Computer Systems
-
-
Jan, M.A.1
-
27
-
-
84978224275
-
Threats to networking cloud and edge datacenters in the internet of things
-
D. Puthal, et al. "Threats to Networking Cloud and Edge Datacenters in the Internet of Things." IEEE Cloud Computing 3(3), 2016, pp. 64-71.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.3
, pp. 64-71
-
-
Puthal, D.1
|