References
- Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu, "Edge Computing: Vision and Challenges," IEEE INTERNET OF THINGS JOURNAL, vol. 3, no. 5, pp-637-646, Oct. 2016. https://doi.org/10.1109/JIOT.2016.2579198
- Stefan Nastic, Hong-Linh Truong, and Schahram Dustdar, "SDG-Pro: a programming framework for software-defined IoT cloud gateways," Journal of Internet Services and Applications, 6:21, Oct. 2015.
- Eren Balevi, and Richard D. Gitlin, "Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks," Networking and Internet Architecture, 4 Jan. 2018.
- M. WeiBbach, N. Taing, M. Wutzler, T. Springer, A. Schill and S. Clarke, "Decentralized coordination of dynamic software updates in the Internet of Things," in Proc. of 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, pp. 171-176, 2016.
- Trusted Computing
- E. Choudhari, K. D.Bodhe, S. M. Mundada, "Secure data aggregation in WSN using iterative filtering algorithm," in Proc. of 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, pp. 1-5, 2017.
- G. Hariton, H. Palihapitya, "Should Consumers Trust Trusted Computing?," 2005 Public Interest Advocacy Centre (PIAC).
- Goldwasser, S.; Micali, S.; Rackoff, C., "The knowledge complexity of interactive proof systems," (PDF), SIAM Journal on Computing, Philadelphia: Society for Industrial and Applied Mathematics, 18 (1): 186-20, 1989.
- Shafi Goldwasser, Silvio Micali, and Charles Rackoff, "The Knowledge Complexity of Interactive Proof-Systems," in Proc. of Proceedings of the seventeenth annual ACM symposium on Theory of computing (STOC 1985), pp. 291-304, 1985.
- L. Sweeney. "k-Anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 557-570. Paper: 14, 2002. https://doi.org/10.1142/S0218488502001648
- A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity," in Proc. of 22nd International Conference on Data Engineering (ICDE'06), Atlanta, GA, USA, pp. 24-24, 2006.
- N. Li, T. Li and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," in Proc. of 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, pp. 106-115, 2007.
- Manuel Blum, Paul Feldman, and Silvio Micali, "Non-Interactive Zero-Knowledge and Its Applications," in Proc. of Proceedings of the twentieth annual ACM symposium on Theory of computing (STOC 1988), pp. 103-112, 1988.
- Amos Fiat and Adi Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," in Proc. of CRYPTO 1986, pp. 186-194, 1986.
- Yehuda Lindell, "An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle," TCC 2015: Theory of Cryptography, pp. 93-109, 2015.
- Ciampi M., Persiano G., Siniscalchi L., Visconti I, "A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles," Theory of Cryptography. TCC 2016. Lecture Notes in Computer Science, vol 9563. Springer, Berlin, Heidelberg, 2016.
- Hazewinkel, Michiel, ed., "Cyclic group," Encyclopedia of Mathematics, [1994] Springer Science+Business Media B.V. / Kluwer Academic Publishers, ISBN 978-1-55608-010-4, 2001.
- C.P. Schnorr, "Efficient identification and signatures for smart cards," in Proc. of G. Brassard, ed. Advances in Cryptology-Crypto '89, 239-252, Springer-Verlag. Lecture Notes in Computer Science, nr 435, 1990.
- F. Kahri, H. Mestiri, B. Bouallegue and M. Machhout, "Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256," in Proc. of 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, pp. 1-5, 2015.
- Shi Z., Ma C., Cote J., Wang B., "Hardware Implementation of Hash Functions. In: Tehranipoor M., Wang C. (eds) Introduction to Hardware Security and Trust," Springer, New York, NY, 2012.
- Latif K., Tariq M., Aziz A., Mahboob A. (2012) Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein. In: Sambath S., Zhu E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg, 2012.