Advertisement

Informatik Spektrum

, Volume 42, Issue 5, pp 340–342 | Cite as

Process Mining and User Privacy in D2D and IoT Networks

  • Muhammad UsmanEmail author
  • Marwa Qaraqe
  • Muhammad Rizwan Asghar
  • Imran Shafique Ansari
Open Access
HAUPTBEITRAG PROCESS MINING AND USER PRIVACY
  • 70 Downloads

Notes

Funding

Open Access funding provided by the Qatar National Library.

References

  1. 1.
    Usman M, Asghar MR, Ansari IS, Granelli F (2017) Towards bootstrapping trust in D2D using PGP and reputation mechanism. In: 2017 IEEE International Conference on Communications (ICC). IEEE, pp 1–6Google Scholar
  2. 2.
    Usman M, Asghar MR, Ansari IS, Granelli F, Abbasi QH, Qaraqe K (2018) A marketplace for efficient and secure caching for IoT applications in 5G networks. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1–6Google Scholar

Copyright information

© The Author(s) 2019

Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors and Affiliations

  • Muhammad Usman
    • 1
    Email author
  • Marwa Qaraqe
    • 1
  • Muhammad Rizwan Asghar
    • 2
  • Imran Shafique Ansari
    • 3
  1. 1.Information and Computing Technology, College of Science and EngineeringHamad Bin Khalifa University (HBKU)DohaQatar
  2. 2.School of Computer ScienceThe University of AucklandAucklandNew Zealand
  3. 3.School of EngineeringUniversity of GlasgowGlasgowUnited Kingdom

Personalised recommendations