PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Privacy Preserving Three-party Authenticated Key Agreement Protocol using Smart Cards

How to make people keep both security and privacy in communication networks has been a hot topic in recent years. Researchers proposed three party authenticated key agreement (3PAKA) protocols to answer this question, which allows two parties to agree a new secure session key with the help of a trusted server. Recently, Yang et al. proposed a provably secure 3PAKA protocol. However, this paper ...

متن کامل

Privacy-preserving Communication Protocols for Authenticated Location-based Services in Mobile Networks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 CHAPTER

متن کامل

Security in Smart Home Environment

Over the last decades the Smart Home development is a continuously evolving field that faces exceptional challenges. However, the recent advances in information and communications technologies have led the Smart Home development in a good level of maturity. A Smart Home is a living environment that incorporates the appropriate technology, called Smart Home technology, to meet the resident goals...

متن کامل

Communication-Efficient Privacy-Preserving Clustering

The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well as regulations, often prevent the sharing of data between multiple parties. Privacy-preserving distributed data mining allows the cooperative computation of data mining algorithms without requiring the participating o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2019

ISSN: 1545-5971,1941-0018,2160-9209

DOI: 10.1109/tdsc.2019.2914911