A high-assurance trust model for digital community control system based on internet of things (English)
- New search for: Li, Hongtao
- New search for: Xing, Jinsheng
- New search for: Ma, Jianfeng
- New search for: Li, Hongtao
- New search for: Xing, Jinsheng
- New search for: Ma, Jianfeng
In:
Wuhan University Journal of Natural Sciences
;
21
, 1
; 29-36
;
2016
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A high-assurance trust model for digital community control system based on internet of things
-
Contributors:
-
Published in:Wuhan University Journal of Natural Sciences ; 21, 1 ; 29-36
-
Publisher:
- New search for: Wuhan University
-
Place of publication:Wuhan
-
Publication date:2016
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
- New search for: 30.00 / 30.00
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 21, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Towards fast repackaging and dynamic authority management on AndroidSong, Jun / Zhang, Mohan / Han, Chunling / Wang, Kaixin / Zhang, Huanguo et al. | 2016
- 10
-
SwordDTA: A dynamic taint analysis tool for software vulnerability detectionCai, Jun / Zou, Peng / Ma, Jinxin / He, Jun et al. | 2016
- 21
-
A cross-domain access control model based on trust measurementYang, Xiaohui / Wang, Hong et al. | 2016
- 29
-
A high-assurance trust model for digital community control system based on internet of thingsLi, Hongtao / Xing, Jinsheng / Ma, Jianfeng et al. | 2016
- 37
-
A new relay attack on distance bounding protocols and its solution with time-stamped authentication for RFIDWei, Guoheng / Zhang, Huanguo / Wang, Ya et al. | 2016
- 47
-
Probabilistic model of software approximate correctnessMa, Yanfang / Chen, Liang et al. | 2016
- 56
-
Implementation of a TPM-based security enhanced browser password managerHe, Yuchen / Wang, Rui / Shi, Wenchang et al. | 2016
- 63
-
Research on application’s credibility verification based on ABDYu, Xuejun / Jiang, Guangzhi / Wang, Pu / Song, Hongbo / Wang, Kun / Liang, Yong et al. | 2016
- 69
-
Game theoretic simulation on the mimicry honeypotShi, Leyi / Zhao, Junnan / Jiang, Lanlan / Xing, Wenjuan / Gong, Jian / Liu, Xin et al. | 2016
- 75
-
Improved differential attack on 30-round SIMON64Wang, Gaoli / Gan, Nan / Li, Yue et al. | 2016
- 84
-
A novel fully homomorphic encryption scheme bsed on LWEDing, Yong / Li, Xiumin / Lü, Haifeng / Li, Xinguo et al. | 2016