1 |
L. Echenauer & V. D. Gligor. (2002, Nov). A Key-Management scheme for Distributed sensor networks. Proceedings of the 9th ACM conference on Computer and communications security. (pp. 41-47).
|
2 |
H. Chan, A. Perrig & D. Song. (2003, May). Random key predistribution schemes for Sensor networks. Proceedings of the 2003 IEEE Symposium on Security and Privacy. (pp. 197-213). DOI : 10.1109/secpri.2003.1199337
|
3 |
S. Zhu, S. Setia & S. Jajodia. (2002). A distributed group key managemet protocol for ad hoc networks. Unpublished manuscript. George Mason University.
|
4 |
A. Khalili, J. Katz & W. A. Arbaugh. (2003, Jan). Toward Secure key Distribution in Truly Ad-Hoc Networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops(SAINT'03 Workshops). (pp. 342-346). DOI : 10.1109/saintw.2003.1210183
|
5 |
S. C. Lee & W. Y. Chung. (2014). A robust wearable u-healthcare platform in wireless sensor network. Journal of Communications and Networks, 16(4), 465-474. DOI : 10.1109/jcn.2014.000077
DOI
|
6 |
T. W. Kim, K. H. Park, S. H. Yi & H. C. Kim. (2014, June). A Big Data Framework for u-Healthcare Systems Utilizing Vital Signs. Proceedings of the 2014 International Symposium on Computer, Consumer and Control(IS3C). (pp. 494-497). DOI : 10.1109/is3c.2014.135
|
7 |
F. Touati, R. Tabish & A. Ben Mnaouer. (2014, April). Towards u-health: An indoor 6LoWPAN based platform for real-time healthcare monitoring. Proceedings of the 2013 6th Joint IFIP Wireless and Mobile Networking Conference(WMNC). (pp. 1-4).
|
8 |
A. Celesti, D. Mulfari, M. Fazio, M. Villari & A. Puliafito. (2016). Exploring container virtualization in iot clouds. Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). (pp. 1-6). DOI : 10.1109/smartcomp.2016.7501691
|
9 |
K. S. Dar, A. Taherkordi & F. Eliassen. (2016). Enhancing dependability of cloud-based iot services through virtualization. Proceedings of the 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), 2016. (pp. 106-116). DOI : 10.1109/iotdi.2015.38
|
10 |
Y. S. Lee, N. Bruce, T. Non, E. Alasaarela & H. Lee. (2015, March). Hybrid Cloud Service Based Healthcare Solutions. Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). (pp. 25-30).
|
11 |
A. Singh & K. Chatterjee. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.
DOI
|
12 |
A. Iera, G. Morabito & L. Atzori. (2016). The internet of things moves into the cloud. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW). (pp. 191-191). DOI : 10.1109/ic2ew.2016.54
|
13 |
S. Singh, Y. S. Jeong & J. H. Park. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222. DOI : 10.1016/j.jnca.2016.09.002
DOI
|
14 |
J. Zhang, H. Huang & X. Wang. (2016). Resource provision algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 64, 23-42.
DOI
|
15 |
V. Varadharajan & U. Tupakula. (2014). Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1), 60-75. DOI : 10.1109/tnsm.2014.041614.120394
DOI
|
16 |
H. N. Saha, A. Mandal & A. Sinha. (2017). Recent trends in the internet of things. Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). (pp. 1-4). DOI : 10.1109/ccwc.2017.7868439
|