Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey

NC Luong, DT Hoang, P Wang, D Niyato… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
This paper provides a state-of-the-art literature review on economic analysis and pricing
models for data collection and wireless communication in Internet of Things (IoT). Wireless …

Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

GM Garrido, J Sedlmeir, Ö Uludağ, IS Alaoui… - Journal of Network and …, 2022 - Elsevier
IoT data markets in public and private institutions have become increasingly relevant in
recent years because of their potential to improve data availability and unlock new business …

[LIBRO][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Divertible protocols and atomic proxy cryptography

M Blaze, G Bleumer, M Strauss - … on the theory and applications of …, 1998 - Springer
First, we introduce the notion of divertibility as a protocol property as opposed to the existing
notion as a language property (see Okamoto, Ohta [OO90]). We give a definition of protocol …

[LIBRO][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Compact e-cash

J Camenisch, S Hohenberger… - … Conference on the Theory …, 2005 - Springer
This paper presents efficient off-line anonymous e-cash schemes where a user can
withdraw a wallet containing 2 ℓ coins each of which she can spend unlinkably. Our first …

An e-voting protocol based on blockchain

Y Liu, Q Wang - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Because of the properties such as transparency, decentralization, irreversibility,
nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its …

Fair blind signatures

M Stadler, JM Piveteau, J Camenisch - … on the Theory and Application of …, 1995 - Springer
A blind signature scheme is a protocol for obtaining a sig-nature from a signer such that the
singer's view of the protocol can-not be linked to the resulting message-signature pair. Blind …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

Threshold proxy signature schemes

K Zhang - International Workshop on Information Security, 1997 - Springer
Delegation of rights is a common practice in the real world. Proxy signature schemes have
been invented to delegate signing capability efficiently and transparently. In this paper, we …