How the AWS IoT Platform Works. https://aws.amazon.com/iot/how-it-works/. [Last Access, p.11, 2016. ,
Apache Milagro Crypto Library ,
The realm of the pairings, Selected Areas in Cryptography?SAC 2013, pp.3-25, 2013. ,
Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006. ,
DOI : 10.1145/1127345.1127346
URL : http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/ateniese.pdf
Untraceable RFID tags via insubvertible encryption, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.92-101, 2005. ,
DOI : 10.1145/1102120.1102134
Divertible protocols and atomic proxy cryptography, Advances in Cryptology?EUROCRYPT'98, pp.127-144, 1998. ,
DOI : 10.1007/BFb0054122
Query privacy in wireless sensor networks, ACM Trans. Sen. Netw, vol.6, issue.2, pp.14-15, 2010. ,
Privacy- and Integrity-Preserving Range Queries in Sensor Networks, IEEE/ACM Transactions on Networking, vol.20, issue.6, pp.1774-1787, 2012. ,
DOI : 10.1109/TNET.2012.2188540
URL : http://www.sigsac.org/ccs/CCS2009/pd/abstract_11.pdf
Smart and Digital City: A Systematic Literature Review, pp.13-43 ,
DOI : 10.1007/978-3-319-06160-3_2
Fixed Argument Pairings, International Conference on Cryptology and Information Security in Latin America, pp.92-108, 2010. ,
DOI : 10.1007/978-3-642-14712-8_6
URL : https://eprint.iacr.org/2010/342.pdf
Adversaries and countermeasures in privacyenhanced urban sensing systems, IEEE Systems Journal, vol.7, issue.2, pp.311-322, 2013. ,
Privacy-Preserving Querying in Sensor Networks, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp.1-6, 2009. ,
DOI : 10.1109/ICCCN.2009.5235352
Location privacy and resilience in wireless sensor networks querying, Comput. Commun, vol.34, issue.3, pp.515-523, 2011. ,
Privacy preservation schemes for querying wireless sensor networks, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.178-183, 2011. ,
DOI : 10.1109/PERCOMW.2011.5766864
URL : http://www.ait.edu.gr/export/sites/default/ait_web_site/faculty/tdim/various/QueryPrivacy_Persens2011.pdf
Pairings for cryptographers, Discrete Applied Mathematics, vol.156, issue.16, pp.3113-3121, 2008. ,
Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol.29, issue.7, pp.1645-1660, 2013. ,
DOI : 10.1016/j.future.2013.01.010
Still wrong use of pairings in cryptography, Cryptology ePrint Archive, vol.223, 2016. ,
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
Privacy-preserving and secure top-k query in twotier wireless sensor network, 2012 IEEE Global Communications Conference (GLOBECOM), pp.335-341, 2012. ,
Handbook of applied cryptography, 1996. ,
Secure and reliable clustering in wireless sensor networks: A critical survey, Computer Networks, vol.56, issue.11, pp.2726-2741, 2012. ,
Sensing as a Service: Challenges, Solutions and Future Directions, IEEE Sensors Journal, vol.13, issue.10, pp.3733-3741, 2013. ,
DOI : 10.1109/JSEN.2013.2262677
Sensors as a Service on the Internet of Things, White paper, ARM Ltd, 2014. ,
Achieving efficient and secure range query in two-tiered wireless sensor networks, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp.380-388, 2014. ,