Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing 2019
DOI: 10.1145/3297280.3297365
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving delegable authentication in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…For IoT devices, attribute-based signatures offer the required flexibility, including the use of these attributes to verify properties during data collection (e.g., data accuracy). Gritti et al Gritti et al (2019) introduce such a lightweight method. Previous work Przytarski et al (2021) shows how this method can be combined with blockchain technology.…”
Section: Situation Logmentioning
confidence: 99%
“…For IoT devices, attribute-based signatures offer the required flexibility, including the use of these attributes to verify properties during data collection (e.g., data accuracy). Gritti et al Gritti et al (2019) introduce such a lightweight method. Previous work Przytarski et al (2021) shows how this method can be combined with blockchain technology.…”
Section: Situation Logmentioning
confidence: 99%
“…First, a user has to be authenticated. We apply a method from Gritti et al [16] that is similar to the attribute-based credentials process described above. To this end, a user transmits all identifying attributes to a trustworthy IoT gateway ➊.…”
Section: Pattern-based Access Controlmentioning
confidence: 99%
“…As IoT technologies capture growing volumes of time series data, there is an emerging need to comprehensively analyze it in an efficient manner. While there are approaches to verify the authenticity of the sources of this IoT data [120] and subsequently provide these time series data to third parties on a demand-driven basis [121], it is also necessary to ensure that the data cannot be tampered with when it is stored and managed.…”
mentioning
confidence: 99%