A key feature for Internet of Things (IoT) is to control what content is available to each user. To handle this access management, encryption schemes can be used. Due to the diverse usage of encryption schemes, there are various realizations of 1-to-1, 1-to-n, and n-to-n schemes in the literature. This multitude of encryption methods with a wide variety of properties presents developers with the challenge of selecting the optimal method for a particular use case, which is further complicated by the fact that there is no overview of existing encryption schemes. To fill this gap, we envision a cryptography encyclopedia providing such an overview of existing encryption schemes. In this survey paper, we take a first step towards such an encyclo...
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-per...
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, ...
Recently group-oriented applications over unsecure open networks such as Internet or wireless networ...
IoT networks are gaining popularity in terms of group networks built by sensor nodes and other IoT-r...
The emergence of the Internet of Things (IoT) is expected to significantly advance the technology de...
The Internet of Things (IoT) is increasingly becoming an integral component of many applications in ...
Internet of Things (IoT) role is inevitable in today’s scenario. The secure communication between Io...
The Internet of Things (IoT) is an information service paradigm based on the integration of smart ob...
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, imp...
Due to limitations of IoT networks including limited bandwidth, memory, battery, etc., secure multic...
The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in ...
This book mainly concentrates on protecting data security and privacy when participants communicate ...
The Internet of Things (IoT) extends Internet connectivity to resource-constrained devices such as s...
This report presents an overview over secure group communication paradigms in ad hoc networks, with ...
The Internet of Things (IoT) is a new technology that has drawn interest from both industry and acad...
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-per...
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, ...
Recently group-oriented applications over unsecure open networks such as Internet or wireless networ...
IoT networks are gaining popularity in terms of group networks built by sensor nodes and other IoT-r...
The emergence of the Internet of Things (IoT) is expected to significantly advance the technology de...
The Internet of Things (IoT) is increasingly becoming an integral component of many applications in ...
Internet of Things (IoT) role is inevitable in today’s scenario. The secure communication between Io...
The Internet of Things (IoT) is an information service paradigm based on the integration of smart ob...
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, imp...
Due to limitations of IoT networks including limited bandwidth, memory, battery, etc., secure multic...
The proliferation of Internet of Things (IoT) devices and applications is on the rise, resulting in ...
This book mainly concentrates on protecting data security and privacy when participants communicate ...
The Internet of Things (IoT) extends Internet connectivity to resource-constrained devices such as s...
This report presents an overview over secure group communication paradigms in ad hoc networks, with ...
The Internet of Things (IoT) is a new technology that has drawn interest from both industry and acad...
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-per...
There is an increasing involvement of the Internet of Things (IoT) in many of our daily activities, ...
Recently group-oriented applications over unsecure open networks such as Internet or wireless networ...