Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Shuaike Dong"'
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 133-143 (2022)
Abstract Today's IoT platforms provide rich functionalities by integrating with popular third‐party services. Due to the complexity, it is critical to understand whether the IoT platforms have properly managed the authorisation in the cross‐cloud
Externí odkaz:
https://doaj.org/article/8fd06dec1ab547b096ec4dbffe1fc40f
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 133-143 (2022)
Today's IoT platforms provide rich functionalities by integrating with popular third‐party services. Due to the complexity, it is critical to understand whether the IoT platforms have properly managed the authorisation in the cross‐cloud IoT envi
Publikováno v:
AsiaCCS
The IoT (Internet of Things) technology has been widely adopted in recent years and has profoundly changed the people's daily lives. However, in the meantime, such a fast-growing technology has also introduced new privacy issues, which need to be bet
Autor:
Yinqian Zhang, Jiongyi Chen, Shuaike Dong, Wenrui Diao, Chaoshun Zuo, Zhiqiang Lin, Kehuan Zhang, Menghan Sun, Qingchuan Zhao
Publikováno v:
DSN
Nowadays, IoT clouds are increasingly deployed to facilitate users to manage and control their IoT devices. Unlike the traditional cloud services with communication between a client and a server, IoT cloud architectures involve three parties: the IoT
Autor:
Shuaike Dong, Jian Liu, Kehuan Zhang, Kai Chen, Fenghao Xu, Menghao Li, Wenrui Diao, Xiangyu Liu, Zhou Li, Xiaofeng Wang
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030017002
SecureComm (1)
SecureComm (1)
Program code is a valuable asset to its owner. Due to the easy-to-reverse nature of Java, code protection for Android apps is of particular importance. To this end, code obfuscation is widely utilized by both legitimate app developers and malware aut
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::db66219bfef68b3e0970c2cab512247e
https://doi.org/10.1007/978-3-030-01701-9_10
https://doi.org/10.1007/978-3-030-01701-9_10