A systematic study of security issues in Internet-of-Things (IoT)
暂无分享,去创建一个
[1] Habtamu Abie,et al. Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.
[2] Ilangko Balasingham,et al. Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.
[3] Zhou Yong. Design and Analysis of Cryptographic Protocols for RFID , 2006 .
[4] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[5] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[6] F. Dressler,et al. A Comprehensive and Comparative Metric for Information Security , 2005 .
[7] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[8] Habtamu Abie. Adaptive security and trust management for autonomic message-oriented middleware , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[9] Dhananjay Singh,et al. A survey of Internet-of-Things: Future vision, architecture, challenges and services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[10] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[11] Jari Veijalainen,et al. Security and privacy threats in IoT architectures , 2012, BODYNETS.
[12] Dieter Hayn,et al. The Internet of Things for Ambient Assisted Living , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[13] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.