2016
DOI: 10.1016/j.csi.2015.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A security gateway application for End-to-End M2M communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 3 publications
0
19
0
Order By: Relevance
“…(i) Vehicle communication systems. Machine-to-Machine (M2M) communication for the IoT system was considered to be a key technology in future networks as introduced by Chen et al [24]. Park et al proposed a transmission strategy for use with a capillary M2M system under wireless personal area networks based on a series of performance analysis for contention adaptation of M2M devices with directional antennas [25,26] [28].…”
Section: Data Analysis For Automaticmentioning
confidence: 99%
“…(i) Vehicle communication systems. Machine-to-Machine (M2M) communication for the IoT system was considered to be a key technology in future networks as introduced by Chen et al [24]. Park et al proposed a transmission strategy for use with a capillary M2M system under wireless personal area networks based on a series of performance analysis for contention adaptation of M2M devices with directional antennas [25,26] [28].…”
Section: Data Analysis For Automaticmentioning
confidence: 99%
“…A randomization process occurs within the EEIRI design for each search query denoted by q. This is conducted through inclusion of (d+2)-dimensions random items that are demonstrated in equation 4as well as encrypted as demonstrated in equation (5). Therefore, there is a difference in terms of encrypted search vectors q′ for each search query.…”
Section: Search Unlinkabilitymentioning
confidence: 99%
“…In any case, the administration and maintenance of these images makes noteworthy requests as far as storage and computational cost. These capabilities might be inaccessible for all smart cellphone clients, especially the individuals who are utilizing lightweight smart cellphone, for example, iPhones [5].…”
Section: Introductionmentioning
confidence: 99%
“…1 Authorized smart device users initially generate the feature vector v from q after being provided with the image query q and the secret keys. 1 Subsequently, the resulting vector is extended and expanded using equations (2) and 4, respectively, to obtain the QSV (refining vector). 1 Finally, authorized smart device users execute the trapdoor algorithm ST q TrpdrGen(SK, q) to hash q into L bucket identifiers using the same settings as those of the index setup.…”
Section: Secure Retrieval Stagementioning
confidence: 99%