Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective
Abstract
Index Terms
- Déjà Vu? Challenges and Opportunities for AM Security from an ICS perspective
Recommendations
Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment
AbstractThe Internet of Things and blockchain, as important technology foundations to enable Web 3.0, have greatly impacted the living and production patterns of people. When they meet together, blockchain services can be used to solve some IoT challenges ...
Keynote: Research Challenges and Opportunities in IoT Security
CyberW '17: Proceedings of the 2017 Workshop on Women in Cyber SecurityThe Internet of Things (IoT) paradigm refers to the network of physical objects or 'things' embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected ...
Blockchain Engineering for the Internet of Things: Systems Security Perspective
IoTPTS '17: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and SecurityThe Internet of Things (IoT) technology has a potential to bring the benefits of intelligently interconnecting not just computers and humans, but most of everyday things. IoT has a promise of opening significant business process improvement ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Mark Yampolskiy,
- Moti Yung,
- Program Chair:
- Mark Yampolskiy
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Keynote
Conference
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 70Total Downloads
- Downloads (Last 12 months)20
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in