G. A. P. Chandrasiri, M. Halgamuge, C. S. Jayasekara
{"title":"A Comparative Study in the Application of IoT in Health Care: Data Security in Telemedicine","authors":"G. A. P. Chandrasiri, M. Halgamuge, C. S. Jayasekara","doi":"10.1007/978-3-030-18075-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_9","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things in the Healthcare Sector: Overview of Security and Privacy Issues","authors":"S. Amaraweera, M. Halgamuge","doi":"10.1007/978-3-030-18075-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_8","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Countering the IoT-Powered Volumetric Cyberattacks with Next-Generation Cyber-Firewall: SeddulbahirSeddulbahir b","authors":"Arif Sari","doi":"10.1007/978-3-030-18075-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_5","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"66 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Privacy Preserving Scheme for Cloud-Enabled Internet of Vehicles Users","authors":"L. Benarous, B. Kadri","doi":"10.1007/978-3-030-18075-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_11","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"for Ensuring , , and in Environments: The State of the Art","authors":"A. Erdem, Sevgi Özkan Yıldırım, Pelin Angin","doi":"10.1007/978-3-030-18075-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_6","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114226739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Packet Transmission Through Trusted Shortest Network Path Using Fuzzy Forecasting for Mobility of MANET Nodes","authors":"S. Bandyopadhyay, Sunil Karforma","doi":"10.1007/978-3-030-18075-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_12","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Perceptive Authentication in Virtual Private Networks Using GPSGPS Data","authors":"N. Ambika","doi":"10.1007/978-3-030-18075-1_2","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_2","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125598105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidisciplinary Intel Fusion Technique for Proactive Cyber-Intelligence Model for the IoT","authors":"Ugur Can Atasoy, Arif Sari","doi":"10.1007/978-3-030-18075-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_4","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography","authors":"Matluba Khodjaeva, Muath A. Obaidat, D. Salane","doi":"10.1007/978-3-030-18075-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_3","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. S. Devi, J. Rayappan, Rengarajan Amirtharajan, P. Praveenkumar
{"title":"A Novel Quantum Encryption and Authentication Framework Integrated with IoT","authors":"R. S. Devi, J. Rayappan, Rengarajan Amirtharajan, P. Praveenkumar","doi":"10.1007/978-3-030-18075-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-18075-1_7","url":null,"abstract":"","PeriodicalId":286839,"journal":{"name":"Security, Privacy and Trust in the IoT Environment","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}