iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.DCAN.2021.09.003
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T07:46:08Z","timestamp":1723362368420},"reference-count":37,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","award":["DF-203-611-1441"],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Communications and Networks"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.dcan.2021.09.003","type":"journal-article","created":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T15:51:55Z","timestamp":1631893915000},"page":"436-445","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"title":["A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications"],"prefix":"10.1016","volume":"8","author":[{"given":"Alaa Omran","family":"Almagrabi","sequence":"first","affiliation":[]},{"given":"A.K.","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.dcan.2021.09.003_bib1","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TNET.2019.2893249","article-title":"Toward secure and efficient communication for the internet of things","volume":"27","author":"Li","year":"2019","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.dcan.2021.09.003_bib2","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.future.2019.12.020","article-title":"A\u00a0blockchain tokenizer for industrial iot trustless applications","volume":"105","author":"Mazzei","year":"2020","journal-title":"Future Generat. Comput. Syst."},{"issue":"7","key":"10.1016\/j.dcan.2021.09.003_bib3","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1007\/s00607-018-0685-7","article-title":"A\u00a0fuzzy security protocol for trust management in the internet of things (fuzzy-iot)","volume":"101","author":"Alshehri","year":"2019","journal-title":"Computing"},{"key":"10.1016\/j.dcan.2021.09.003_bib4","first-page":"1","article-title":"Simulation analysis of supply chain risk management system based on iot information platform","author":"Gao","year":"2019","journal-title":"Enterprise Inf. Syst."},{"issue":"13","key":"10.1016\/j.dcan.2021.09.003_bib5","doi-asserted-by":"crossref","first-page":"3030","DOI":"10.3390\/s19133030","article-title":"Wearable iot smart-log patch: an edge computing-based bayesian deep learning network system for multi access physical monitoring system","volume":"19","author":"Manogaran","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.dcan.2021.09.003_bib6","first-page":"1","article-title":"Fotb: a secure blockchain-based firmware update framework for iot environment","author":"Yohan","year":"2019","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.dcan.2021.09.003_bib7","first-page":"1","article-title":"An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for wsn-assisted iot system","author":"Preeth","year":"2018","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.1016\/j.dcan.2021.09.003_bib8","doi-asserted-by":"crossref","first-page":"101522","DOI":"10.1016\/j.scs.2019.101522","article-title":"An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications","volume":"49","author":"Jegadeesan","year":"2019","journal-title":"Sustainable Cities and Society"},{"key":"10.1016\/j.dcan.2021.09.003_bib9","article-title":"A\u00a0decentralized scalable security framework for end-to-end authentication of future iot communication","author":"Sheron","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"2","key":"10.1016\/j.dcan.2021.09.003_bib10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.dcan.2019.08.006","article-title":"A\u00a0survey of edge computing-based designs for iot security","volume":"6","author":"Sha","year":"2020","journal-title":"Digital Communications and Networks"},{"key":"10.1016\/j.dcan.2021.09.003_bib11","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2020.04.019","article-title":"Analysis and research on network security and privacy security in ubiquitous electricity internet of things","volume":"158","author":"Hou","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.dcan.2021.09.003_bib12","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","article-title":"Privacy preservation in blockchain based iot systems: integration issues, prospects, challenges, and future research directions","volume":"97","author":"Hassan","year":"2019","journal-title":"Future Generat. Comput. Syst."},{"issue":"5","key":"10.1016\/j.dcan.2021.09.003_bib13","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1109\/TSG.2017.2720159","article-title":"Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries","volume":"8","author":"He","year":"2017","journal-title":"IEEE Transactions on Smart Grid"},{"key":"10.1016\/j.dcan.2021.09.003_bib14","doi-asserted-by":"crossref","first-page":"184438","DOI":"10.1109\/ACCESS.2019.2961270","article-title":"Achieving privacy-preserving subset aggregation in fog-enhanced iot","volume":"7","author":"Mahdikhani","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.dcan.2021.09.003_bib15","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s11235-017-0352-x","article-title":"Esot: a new privacy model for preserving location privacy in internet of things","volume":"67","author":"Ullah","year":"2018","journal-title":"Telecommun. Syst."},{"key":"10.1016\/j.dcan.2021.09.003_bib16","unstructured":"K. Lh, X.-Y. Liu, G. Chen, et\u00a0al., Federated Tensor Mining for Secure Industrial Internet of Things."},{"issue":"3","key":"10.1016\/j.dcan.2021.09.003_bib17","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2017.1600228CM","article-title":"A\u00a0multi-tenant cloud-based dc nano grid for self-sustained smart buildings in smart cities","volume":"55","author":"Kumar","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.dcan.2021.09.003_bib18","doi-asserted-by":"crossref","first-page":"107077","DOI":"10.1016\/j.measurement.2019.107077","article-title":"Hashed needham schroeder industrial iot based cost optimized deep secured data transmission in cloud","volume":"150","author":"Alzubi","year":"2020","journal-title":"Measurement"},{"issue":"1","key":"10.1016\/j.dcan.2021.09.003_bib19","first-page":"1","article-title":"Towards secure and network state aware bitrate adaptation at iot edge","volume":"9","author":"Zeng","year":"2020","journal-title":"J.\u00a0Cloud Comput."},{"key":"10.1016\/j.dcan.2021.09.003_bib20","doi-asserted-by":"crossref","first-page":"107328","DOI":"10.1016\/j.comnet.2020.107328","article-title":"Sutsec: sdn utilized trust based secure clustering in iot","author":"Kalkan","year":"2020","journal-title":"Comput. Network."},{"key":"10.1016\/j.dcan.2021.09.003_bib21","unstructured":"J. Jeon, J. H. Park, Y.-S. Jeong, Dynamic Analysis for Iot Malware Detection with Convolution Neural Network Model, IEEE Access."},{"issue":"5","key":"10.1016\/j.dcan.2021.09.003_bib22","doi-asserted-by":"crossref","first-page":"7702","DOI":"10.1109\/JIOT.2019.2901840","article-title":"Privacy-preserving support vector machine training over blockchain-based encrypted iot data in smart cities","volume":"6","author":"Shen","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"10.1016\/j.dcan.2021.09.003_bib23","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1109\/TIFS.2018.2885287","article-title":"Towards efficient fine-grained access control and trustworthy data processing for remote monitoring services in iot","volume":"14","author":"Chen","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.dcan.2021.09.003_bib24","doi-asserted-by":"crossref","first-page":"101195","DOI":"10.1016\/j.pmcj.2020.101195","article-title":"A\u00a0blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data","volume":"66","author":"Smahi","year":"2020","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.dcan.2021.09.003_bib25","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","article-title":"An efficient lightweight integrated blockchain (elib) model for iot security and privacy","volume":"102","author":"Mohanty","year":"2020","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.dcan.2021.09.003_bib26","doi-asserted-by":"crossref","first-page":"101194","DOI":"10.1016\/j.pmcj.2020.101194","article-title":"Eccbap: a secure ecc-based authentication protocol for iot edge devices","volume":"67","author":"Rostampour","year":"2020","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.dcan.2021.09.003_bib27","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.future.2020.02.025","article-title":"Secure monitoring in iot-based services via fog orchestration","volume":"107","author":"Viejo","year":"2020","journal-title":"Future Generat. Comput. Syst."},{"key":"10.1016\/j.dcan.2021.09.003_bib28","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.procs.2019.12.100","article-title":"Secure data provenance in iot network using bloom filters","volume":"163","author":"Siddiqui","year":"2019","journal-title":"Procedia Computer Science"},{"issue":"1","key":"10.1016\/j.dcan.2021.09.003_bib29","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1007\/s10586-017-1298-1","article-title":"A\u00a0new computing environment for collective privacy protection from constrained healthcare devices to iot cloud services","volume":"22","author":"Elmisery","year":"2019","journal-title":"Cluster Comput."},{"key":"10.1016\/j.dcan.2021.09.003_bib30","unstructured":"S. R. Zahra, M. A. Chishti, Fuzzy Logic and Fog Based Secure Architecture for Internet of Things (Flfsiot)."},{"issue":"5","key":"10.1016\/j.dcan.2021.09.003_bib31","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s00287-019-01212-y","article-title":"Process mining and user privacy in d2d and iot networks","volume":"42","author":"Usman","year":"2019","journal-title":"Informatik-Spektrum"},{"issue":"8","key":"10.1016\/j.dcan.2021.09.003_bib32","doi-asserted-by":"crossref","first-page":"4684","DOI":"10.1007\/s11227-018-2686-x","article-title":"Secure data processing for iot middleware systems","volume":"75","author":"Ayoade","year":"2019","journal-title":"J.\u00a0Supercomput."},{"issue":"5","key":"10.1016\/j.dcan.2021.09.003_bib33","doi-asserted-by":"crossref","first-page":"3747","DOI":"10.1109\/JIOT.2020.2974631","article-title":"Intelligent reward-based data offloading in next-generation vehicular networks","volume":"7","author":"Raja","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10.1016\/j.dcan.2021.09.003_bib34","doi-asserted-by":"crossref","first-page":"2640","DOI":"10.1109\/JIOT.2019.2955503","article-title":"Differentially private high-dimensional data publication in internet of things","volume":"7","author":"Zheng","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.dcan.2021.09.003_bib35","article-title":"Generalized pvo-based dynamic block reversible data hiding for secure transmission using firefly algorithm","author":"Abbasi","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.1016\/j.dcan.2021.09.003_bib36","doi-asserted-by":"crossref","first-page":"27156","DOI":"10.1109\/ACCESS.2018.2828398","article-title":"Improved generalization for secure data publishing","volume":"6","author":"Yaseen","year":"2018","journal-title":"IEEE Access"},{"issue":"6","key":"10.1016\/j.dcan.2021.09.003_bib37","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","article-title":"Blockchain and federated learning for privacy-preserved data sharing in industrial iot","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Digital Communications and Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864821000638?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2352864821000638?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:17:52Z","timestamp":1710256672000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2352864821000638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["S2352864821000638"],"URL":"https:\/\/doi.org\/10.1016\/j.dcan.2021.09.003","relation":{},"ISSN":["2352-8648"],"issn-type":[{"value":"2352-8648","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications","name":"articletitle","label":"Article Title"},{"value":"Digital Communications and Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dcan.2021.09.003","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Chongqing University of Posts and Telecommunications. Publishing Services by Elsevier B.V. on behalf of KeAi Communications Co. Ltd.","name":"copyright","label":"Copyright"}]}}