0 | -- | 0 | Nisha Panwar, Shantanu Sharma 0001, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian. CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes |
0 | -- | 0 | Heena Rathore, Abhay Samant, Murtuza Jadliwala. TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles |
0 | -- | 0 | Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao. Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks |
0 | -- | 0 | Abdelaziz Khaled, Samir Ouchani, Zahir Tari, Khalil Drira. Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems |
0 | -- | 0 | Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey. Safe and Private Forward-trading Platform for Transactive Microgrids |
0 | -- | 0 | Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Mehdi Elahi, Claus Pahl. From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain |
0 | -- | 0 | Abhimanyu Rawat, Mohammad Khodari, Mikael Asplund, Andrei V. Gurtov. Decentralized Firmware Attestation for In-Vehicle Networks |
0 | -- | 0 | Venkata Reddy Palleti, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed, Aditya Mathur. Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? |
0 | -- | 0 | Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk. Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue |
0 | -- | 0 | Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm. Preserving Secrecy in Mobile Social Networks |
0 | -- | 0 | Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu. Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems |