References
- A. Celesti, A. Galletta, L. Carnevale,M. Fazio, A. Lay-Ekuakille & M. Villari. (2017). An IoT Cloud System for Traffic Monitoring and Vehicular Accidents Prevention Based on Mobile Sensor Data Processing. IEEE Sensors Journal, PP(99), 1-1.
- N. N. Dao, Y. Kim, S. Jeong, M. Park & S. Cho. (2017). Achievable Multi-Security Levels for Lightweight IoT-enabled Devices in Infrastructureless Peer-Aware Communications. IEEE Access, PP(99). 1-1.
- S. Ma, Q. Liu & P. C. -Y. Sheu. (2017). Foglight: Visible Light-enabled Indoor Localization System for Low-power IoT Devices. IEEE Internet of Things Journal. PP(99). 1-1.
- K. Yang, d. Blaauw & D. Sylvester. (2017). Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey. IEEE Micro, 37(6). 72-89. https://doi.org/10.1109/MM.2017.4241357
- P. Xu, X. Tang, W. Wang, H. Jin & L. T. Yang. (2017). Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT" IEEE Access, 5, 24775-24784. https://doi.org/10.1109/ACCESS.2017.2771301
- G. Mao. (2017). 5G green mobile communication networks. China Communications. 14(2), 183-184. https://doi.org/10.1109/CC.2017.7868166
- S. Chen, S. Sun, Q. Gao & X. Su. (2016). Adaptive Beamforming in TDD-Based Mobile Communication Systems: State of the Art and 5G Research Directions. IEEE Wireless Communications. 23(6),.81-87. https://doi.org/10.1109/MWC.2016.1500105WC
- J. Hur & D. K. Noh. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst., 22(7), 1214-1221. https://doi.org/10.1109/TPDS.2010.203
- X. Liu, Y. Zhang, B. Wang, & J. Yang. (2013). Mona: Secure multiowner data sharing for dynamic groups in the cloud, IEEE Trans. Parallel Distrib. Syst., 24(6), 1182-1191. https://doi.org/10.1109/TPDS.2012.331
- Z. Zhu, Z. Jiang, & R. Jiang. (2013, December). The attack on Mona: Secure multiowner data sharing for dynamic groups in the cloud. Proceedings of the Int. Conf. Inf. Sci. Cloud Comput.Companion. (pp. 185-189). Guangzhou : IEEE
- J. Bethencourt, A. Sahai & B. Waters. (2007, May). Ciphertext-policy attribute based encryption. Proceedings of the IEEE Symp. Secur. Privacy (SP). (pp. 321-334). Berkeley : IEEE
- L. Cheung & C. Newport. (2007, January). Provably secure ciphertext policy ABE. Proceedings of the 14th ACM Conf. Comput. Commun. Secur. (CCS). (pp. 456-465). Alexandria : ACM
- M. Chase. (2007, February) Multi-authority attribute based encryption. Proceedings of the. 4th IACR Theory Cryptogr. Conf. (TCC), 4392. (pp. 515-534). Amsterdam : Springer
- H. Lin, Z. Cao, X. Liang & J. Shao. (2008, December). Secure threshold multi authority attribute based encryption without a central authority. Proceedings of the 9th Int. Conf. Cryptol. India (INDOCRYPT), 5365. (pp. 426-436). Kharagpur : Springer
- Y. Rouselakis & B. Waters. (2015, January). Efficient statically -secure large-universe multi-authority attribute-based encryption. Proceedings of the 19th Int. Conf. Financial Cryptogr. Data Secur. (FC), 8975. (pp. 315-332). San Juan : Springer
- K. Emura, A. Miyaji, A. Nomura, K. Omote & M. Soshi. (2009, April). A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Proceedings of the 5th Int. Conf. Inf. Secur. Pract. Exper., 5451. (pp. 13-23). Xi'an : Springer
- J. Herranz, F. Laguillaumie & C. Rafols. (2010, May). Constant size ciphertexts in threshold attribute-based encryption. Public Key Cryptography (Lecture Notes in Computer Science), 6056. (pp. 19-34). Paris : Springer
- C. Chen, Z. Zhang & D. Feng. (2011, October). Effcient ciphertext policy attributebased encryption with constant-size ciphertext and constant computation cost. Proceedings of the 5th Int. Conf. Provable Secur. (ProvSec). 6980. (pp. 84-101). Xi'an : Springer
- Y. S. Rao & R. Dutta. (2013, December). Recipient anonymous ciphertext-policy attribute based encryption. Proceedings of the 9th Int. Conf. Inf. Syst. Secur. (ICISS). 8303. (pp. 329-344). Kolkata : Springer
- J. Hur & D. K. Noh. (2011). Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst., 22(7), 1214-1221. https://doi.org/10.1109/TPDS.2010.203
- K. Yang, X. Jia & K. Ren. (2013). Attribute-based ne-grained access control with efcient revocation in cloud storage systems. Proceedings of the 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur. (ASIACCS), 523-528.
- S. Yu, C. Wang, K. Ren & W. Lou. (2010). Attribute based data sharing with attribute revocation. Proceedings of the 5th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), pp. 261-270.
- Y. Zhang, X. Chen, J. Li, H. Li & F. Li. (2014). Attribute-based data sharing with exible and direct revocation in cloud computing. KSII Trans. Internet Inf. Syst., 8(11), 4028-4049. https://doi.org/10.3837/tiis.2014.11.021
- N. Attrapadung & H. Imai. (2009). Conjunctive broadcast and attribute-based encryption. Proceedings of the 3rd Int. Conf. Palo Alto Pairing-Based Cryptogr. (Pairing), 5671, 248-265.
- Y. S. Jeong. (2016). An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor. Journal of Digital Convergence, 14(3), 261-267. https://doi.org/10.14400/JDC.2016.14.3.261
- Y. S. Jeong. (2017). Data Storage and Security Model for Mobile Healthcare Service based on IoT. Journal of Digital Convergence, 15(3), 187-193. https://doi.org/10.14400/JDC.2017.15.3.187
- Y. S. Jeong. (2019). An Efficient Personal Information Collection Model Design Using In-Hospital IoT System. Convergence Society for SMB, 9(3), 140-145.