EXCHANge: Securing IoT via channel anonymity.
Savio SciancaleporeGabriele OligeriGiuseppe PiroGennaro BoggiaRoberto Di PietroPublished in: Comput. Commun. (2019)
Keyphrases
- management system
- multi channel
- trusted third party
- mobile computing
- information security
- cloud computing
- information exchange
- multiple access
- communication channels
- big data
- anonymous communication
- location privacy
- share information
- privacy protection
- cellular networks
- information systems
- security problems
- location information
- multi user
- data management
- noisy channel
- wireless networks