Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
- 18 February 2020
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 30 references indexed in Scilit:
- A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environmentFuture Generation Computer Systems, 2018
- Security & Privacy Challenges in IoT-Based Health CloudPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- A Survey of Security Aspects for Internet of Things in HealthcareLecture Notes in Electrical Engineering, 2016
- Secure authentication scheme for IoT and cloud serversPervasive and Mobile Computing, 2015
- The Internet of Things for Health Care: A Comprehensive SurveyIEEE Access, 2015
- Security, Trust and Implementation Limitations of Prominent IoT PlatformsPublished by Springer Science and Business Media LLC ,2015
- From the internet of things to embedded intelligenceWorld Wide Web, 2012
- Identity management directions in future internetIEEE Communications Magazine, 2011
- Securing the Internet of ThingsComputer, 2011
- Internet of Things – New security and privacy challengesComputer Law & Security Review, 2010