Autonomic schemes for threat mitigation in Internet of Things
QM Ashraf, MH Habaebi - Journal of Network and Computer Applications, 2015 - Elsevier
Abstract Internet of Things (IoT) refers to the expansion of Internet technologies to include
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …
wireless sensor networks (WSNs) and smart objects by extensive interfacing of exclusively …
A survey of group key distribution schemes with self-healing property
T Rams, P Pacyna - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
Secure key distribution schemes for group communications allow to establish a secure
multicast communication between a group manager and group members through an …
multicast communication between a group manager and group members through an …
Independent motion detection in 3D scenes
HS Sawhney, Y Guo, R Kumar - IEEE Transactions on Pattern …, 2000 - ieeexplore.ieee.org
This paper presents an algorithmic approach to the problem of detecting independently
moving objects in 3D scenes that are viewed under camera motion. There are two …
moving objects in 3D scenes that are viewed under camera motion. There are two …
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications
Abstract The Internet of Things (IoT) aims to collect a large amount of data and exchange
them over wireless networks by connecting billions of perception objects. Security becomes …
them over wireless networks by connecting billions of perception objects. Security becomes …
[HTML][HTML] A new key protocol design for cryptocurrency wallet
S Sung - ICT Express, 2021 - Elsevier
The majority of hacking accidents in cryptocurrency occur when the information of a
cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key …
cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key …
Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor …
X Sun, X Wu, C Huang, Z Xu, J Zhong - Ad Hoc Networks, 2016 - Elsevier
Though lots of research results about self-healing key management under unreliable links
have been proposed, there are still some shortcomings, such as the inefficiency of …
have been proposed, there are still some shortcomings, such as the inefficiency of …
United we stand: Intrusion resilience in mobile unattended WSNs
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is …
distributed nature, limited sensor resources, and lack of tamper resistance. Once a sensor is …
Intrusion-resilience in mobile unattended WSNs
Wireless Sensor Networks (WSNs) are susceptible to a wide range of attacks due to their
distributed nature, limited sensor resources and lack of tamper-resistance. Once a sensor is …
distributed nature, limited sensor resources and lack of tamper-resistance. Once a sensor is …
Color image quality assessment based on image quality parameters perceived by human vision system
ZX Xie, ZF Wang - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
A color image quality assessment (C-IQA) method was proposed based on the primary and
fundamental image quality parameters perceived by human vision system. The methods for …
fundamental image quality parameters perceived by human vision system. The methods for …
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
Q Wang, H Chen, L Xie, K Wang - Ad Hoc Networks, 2013 - Elsevier
In order to resolve the collusion resistance problem in the one-way hash chain-based self-
healing group key distribution schemes and improve the performance of previous self …
healing group key distribution schemes and improve the performance of previous self …