This is the author accepted manuscript. The final version is available from IEEE via the DOI in this record.With the rapid development of the Internet, more and more devices are being connected to the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two important but contradictory factors to ensure the security of IoT networks. How to provide an accountable anonymous access to IoT networks is a challenging task. Since the IoT network is largely driven by services, in this paper we propose a new and efficient architecture to achieve accountable anonymous access to IoT networks based on services. In this architecture, a self-certifying identifier is proposed to efficiently identify a service. The effic...
The Internet of Things (IoT) is the network of connected computing devices that have the ability to ...
Highly distributed smart environments, such as Smart Cities, require scalable architectures to suppo...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....
The Internet of Things (IoT) has set off a new information technology revolution due to its convenie...
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT) accounta...
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously a...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to en...
Security and privacy of information transmitted among the devices involved in an Internet of Things ...
Though most would agree that accountability and privacy are both valuable, today’s Internet provides...
While smart home devices have the potential to improve people's lives by providing increased safety,...
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT) accounta...
With the growing popularity of the Internet of Things (IoT), devices in households and offices are b...
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from ...
Internet of Things (IoT) systems can often pose risk to users' privacy via disclosure of personal in...
The Internet of Things (IoT) is the network of connected computing devices that have the ability to ...
Highly distributed smart environments, such as Smart Cities, require scalable architectures to suppo...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....
The Internet of Things (IoT) has set off a new information technology revolution due to its convenie...
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT) accounta...
The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously a...
The Internet infrastructure relies on the correct functioning of the basic underlying protocols, whi...
Internet of Things (IoT) is characterized, at the system level, by high diversity with respect to en...
Security and privacy of information transmitted among the devices involved in an Internet of Things ...
Though most would agree that accountability and privacy are both valuable, today’s Internet provides...
While smart home devices have the potential to improve people's lives by providing increased safety,...
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT) accounta...
With the growing popularity of the Internet of Things (IoT), devices in households and offices are b...
Ubiquitous systems and the Internet of Things (IoT) are on the rise. However, there are issues from ...
Internet of Things (IoT) systems can often pose risk to users' privacy via disclosure of personal in...
The Internet of Things (IoT) is the network of connected computing devices that have the ability to ...
Highly distributed smart environments, such as Smart Cities, require scalable architectures to suppo...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....