4.5 Article

An integrated framework for privacy protection in IoT-Applied to smart healthcare

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Designing privacy-aware internet of things applications

Charith Perera et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective

Hadi Habibzadeh et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Security and Privacy in the Internet of Things

Kassem Fawaz et al.

COMPUTER (2019)

Article Computer Science, Information Systems

Cyberphysical Security for the Masses A Survey of the Internet Protocol Suite for Internet of Things Security

Hannes Tschofenig et al.

IEEE SECURITY & PRIVACY (2019)

Review Computer Science, Information Systems

Privacy in Internet of Things: From Principles to Technologies

Chao Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Psychology, Multidisciplinary

Willingness to provide personal information: Perspective of privacy calculus in IoT services

Dongyeon Kim et al.

COMPUTERS IN HUMAN BEHAVIOR (2019)

Article Computer Science, Software Engineering

Architectural Considerations for Privacy on the Edge

Christos Tsigkanos et al.

IEEE INTERNET COMPUTING (2019)

Article Computer Science, Interdisciplinary Applications

The industrial internet of things (IIoT): An analysis framework

Hugh Boyes et al.

COMPUTERS IN INDUSTRY (2018)

Article Computer Science, Information Systems

Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog computing

Xiaofan Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

A Theory of Pricing Private Data

Chao Li et al.

COMMUNICATIONS OF THE ACM (2017)

Article Computer Science, Theory & Methods

A Survey on Trust Modeling

Jin-Hee Cho et al.

ACM COMPUTING SURVEYS (2015)

Editorial Material Computer Science, Information Systems

Humans in the Loop

Bill Horne

IEEE SECURITY & PRIVACY (2014)