- Home
- Publications
- Publication Search
- Publication Details
Title
Privacy in the Internet of Things: threats and challenges
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 7, Issue 12, Pages 2728-2742
Publisher
Wiley
Online
2013-06-10
DOI
10.1002/sec.795
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization
- (2012) Luigi Atzori et al. Computer Networks
- Wireless Visions: A Look to the Future by the Fellows of the WWRF
- (2012) Klaus David et al. IEEE Vehicular Technology Magazine
- Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
- (2012) Eran Toch et al. USER MODELING AND USER-ADAPTED INTERACTION
- A security framework for privacy-preserving data aggregation in wireless sensor networks
- (2011) Aldar C-F. Chan et al. ACM Transactions on Sensor Networks
- Securing the Internet of Things
- (2011) Rodrigo Roman et al. COMPUTER
- Distributed Privacy-Preserving Access Control in Sensor Networks
- (2011) Rui Zhang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A survey on privacy in mobile participatory sensing applications
- (2011) Delphine Christin et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A Systematic Review of Re-Identification Attacks on Health Data
- (2011) Khaled El Emam et al. PLoS One
- Security Challenges in the IP-based Internet of Things
- (2011) Tobias Heer et al. WIRELESS PERSONAL COMMUNICATIONS
- Privacy-preserving data publishing
- (2010) Benjamin C. M. Fung et al. ACM COMPUTING SURVEYS
- Myths and fallacies of "personally identifiable information"
- (2010) Arvind Narayanan et al. COMMUNICATIONS OF THE ACM
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- A survey of mobile phone sensing
- (2010) Nicholas Lane et al. IEEE COMMUNICATIONS MAGAZINE
- Building the Internet of Things Using RFID: The RFID Ecosystem Experience
- (2009) Evan Welbourne et al. IEEE INTERNET COMPUTING
- Engineering Privacy
- (2008) S. Spiekermann et al. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
- A survey of RFID privacy approaches
- (2008) Marc Langheinrich Personal and Ubiquitous Computing
- A survey of computational location privacy
- (2008) John Krumm Personal and Ubiquitous Computing
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started