Network Security and Trust

Filter
Chapter

Search results

  • 2022

    Privacy Management in eHealth Using Contextual Consenting

    Kortesniemi, Y. & Pöyry-Lassila, P., 8 Sept 2022, AI in eHealth: Human Autonomy, Data Governance and Privacy in Healthcare. Cambridge University Press, p. 125-146 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientific

  • 2021

    Game-theoretic analysis of encrypted cloud data deduplication

    Liang, X., Yan, Z., Deng, R. H., Kantola, R., Ding, W., Yu, X. & Zheng, Q., 2021, Data Deduplication Approaches: Concepts, Strategies and Challenges. Thwel, T. T. & Sinha, G. R. (eds.). Academic Press, p. 335-354 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2020

    Flexible Access Control over Privacy-Preserving Cloud Data Processing

    Ding, W., Qian, X., Hu, R., Yan, Z. & Deng, R. H., 2020, Innovation in Cybersecurity Education. Daimi, K. & Francia III, G. (eds.). Springer, p. 231-255 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    Open Access
    File
    39 Downloads (Pure)
  • Leveraging Interledger Technologies in IoT Security Risk Management

    Lagutin, D., Kortesniemi, Y., Siris, V. A., Fotiu, N., Polyzos, G. C. & Wu, L., 2020, Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection. Soldatos, J. (ed.). NOW Publishers, p. 228-246

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    Open Access
    File
    145 Downloads (Pure)
  • The SOFIE Approach to Address the Security and Privacy of the IoT Using Interledger Technologies

    Lagutin, D., Anton, P., Bellesini, F., Bragatto, T., Cavadenti, A., Croce, V., Fotiou, N., Haavala, M., Kortesniemi, Y., Leligou, H. C., Manzoor, A., Oikonomidis, Y., Polyzos, G. C., Raveduto, G., Santori, F., Siris, V. A., Trakadas, P. & Verber, M., 2020, Security and Privacy in the Internet of Things: Challenges and Solutions. Hernández Ramos, J. L. & Skarmeta, A. (eds.). IOS Press, Vol. 27. p. 76 - 93 (Ambient Intelligence and Smart Environments; vol. 27).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2019

    Encrypted Big Data Deduplication in Cloud Storage

    Yan, Z., Liang, X., Ding, W., Yu, X., Wang, M. & Deng, R. H., 13 Mar 2019, Smart Data: State-of-the-Art and Perspectives in Computing and Applications. Li, K-C., Zhang, Q., Yang, L. T. & DiMartin, B. (eds.). Taylor & Francis, p. 63-91 30 p. (Chapman & Hall/CRC Big Data Series).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • Security Design for D2D

    Wang, M. & Yan, Z., 2019, Wiley 5G Ref: The Essential 5G Reference Online . John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2018

    Customer edge switching: A security framework for 5G

    Kabir, H., Kantola, R. & Santos, J. L., 15 Feb 2018, A Comprehensive Guide to 5G Security. John Wiley & Sons, p. 195-230 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption

    Zhang, L., Yan, Z. & Kantola, R., 2018, Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. Gupta, B. B., Agrawal, D. P. & Wang, H. (eds.). CRC Press, p. 389-424 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2017

    Unwanted Traffic Detection and Control Based on Trust Management

    Yan, Z., Kantola, R., Zhang, L. & Ma, Y., 1 Jan 2017, Information Fusion for Cyber-Security Analytics. Alsmadi, I. M., Karabatis, G. & AlEroud, A. (eds.). Springer, p. 77-109 33 p. (Studies in computational intelligence; vol. 691).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    1 Citation (Scopus)
  • 2016

    Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing

    Yan, Z., Li, X. & Kantola, R., 2016, Advances in Mobile Cloud Computing and Big Data under the 5G Era. Mavromoustakis, C., Mastorakis, G. & Dobre, C. (eds.). Springer, p. 65-113 (Studies in Big Data; vol. 22).

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2015

    LTE Architecture Integration with SDN

    Costa-Requena, J., Kantola, R., Santos, J. L., Guasch, V. F., Kimmerlin, M., Mikola, A. & Manner, J., 19 Jun 2015, Software Defined Mobile Networks (SDMN): Concepts and Challenges. Wiley-Blackwell, p. 81-105 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

    1 Citation (Scopus)
  • 2013

    Towards Trustworthy Mobile Social Networking

    Yan, Z., Chen, Y., Zhang, P. & Kantola, R., 2013, Mobile Social Networking: An Innovative Approach. Chin, A. & Zhang, D. (eds.). Springer, p. 195-236

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

  • 2011

    HIP: Host Identity Protocol

    Nikander, P., Gurtov, A. & Henderson, T., 2011, Next-Generation Internet Architectures and Protocols. B.Ramamurthy, G. R. (ed.). Cambridge, UK: Association for Symbolic Logic

    Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review