4.8 Article

Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS)

Related references

Note: Only part of the references are listed.
Article Telecommunications

A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective

Hezam Akram Abdul-Ghani et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Privacy-Preserving Delegable Authentication in the Internet of Things

Clementine Gritti et al.

SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)

Article Automation & Control Systems

Industrial Internet of Things: Challenges, Opportunities, and Directions

Emiliano Sisinni et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Integration of Anonymous Credential sytems in IoT Constrained Environments

Jose Luis Canovas Sanchez et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

Attribute-Based Credentials for Privacy-Aware Smart Health Services in IoT- Based Smart Cities

Jose Maria de Fuentes et al.

COMPUTER (2018)

Article Computer Science, Information Systems

Holistic Privacy-Preserving Identity Management System for the Internet of Things

Jorge Bernal Bernabe et al.

MOBILE INFORMATION SYSTEMS (2017)

Review Computer Science, Information Systems

A Survey on Security and Privacy Issues in Internet-of-Things

Yuchen Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Information Systems

Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain

Jan Camenisch et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Proceedings Paper Computer Science, Information Systems

Efficient Fully Structure-Preserving Signatures for Large Messages

Jens Groth

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I (2015)

Article Computer Science, Theory & Methods

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things

Jinshu Su et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Article Computer Science, Information Systems

Privacy in the Internet of Things: threats and challenges

Jan Henrik Ziegeldorf et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

Anonymous authentication for privacy-preserving IoT target-driven applications

Almudena Alcaide et al.

COMPUTERS & SECURITY (2013)

Editorial Material Computer Science, Information Systems

Stuxnet: Dissecting a Cyberwarfare Weapon

Ralph Langner

IEEE SECURITY & PRIVACY (2011)

Article Mathematics, Applied

Pairings for cryptographers

Steven D. Galbraith et al.

DISCRETE APPLIED MATHEMATICS (2008)