A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A secure cloud-based solution for real-time monitoring and management of Internet of underwater things (IOUT)
Authors
Keywords
-
Journal
NEURAL COMPUTING & APPLICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Nature America, Inc
Online
2018-11-03
DOI
10.1007/s00521-018-3774-9
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
- (2018) Yinhao Jiang et al. Future Generation Computer Systems-The International Journal of eScience
- Secure and fine-grained access control on e-healthcare records in mobile cloud computing
- (2018) Yi Liu et al. Future Generation Computer Systems-The International Journal of eScience
- A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models
- (2017) Chien-Chi Kao et al. SENSORS
- A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram
- (2017) Long Li et al. IEEE Access
- E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things
- (2016) Zhangbing Zhou et al. IEEE SENSORS JOURNAL
- An Access Control Model for Online Social Networks Using User-to-User Relationships
- (2016) Yuan Cheng et al. IEEE Transactions on Dependable and Secure Computing
- Secure Access Control of E-Health System with Attribute-Based Encryption
- (2016) Hongyang Yan et al. INTELLIGENT AUTOMATION AND SOFT COMPUTING
- Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment
- (2016) Lixian Liu et al. Security and Communication Networks
- Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
- (2016) Jie Xu et al. SOFT COMPUTING
- Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
- (2016) Hong Zhong et al. SOFT COMPUTING
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- (2015) Zhibin Zhou et al. IEEE TRANSACTIONS ON COMPUTERS
- Internet of Things for Smart Cities
- (2014) Andrea Zanella et al. IEEE Internet of Things Journal
- Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
- (2013) Lan Zhou et al. IEEE Transactions on Information Forensics and Security
- An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
- (2013) Changji Wang et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
- (2012) Ming Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- An overview of the internet of underwater things
- (2012) Mari Carmen Domingo JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
- (2011) Guojun Wang et al. COMPUTERS & SECURITY
- HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
- (2011) Zhiguo Wan et al. IEEE Transactions on Information Forensics and Security
- Secure threshold multi authority attribute based encryption without a central authority☆
- (2010) Huang Lin et al. INFORMATION SCIENCES
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search