A Novel Secure Architecture for the Internet of Things
暂无分享,去创建一个
Peng Li | He Xu | Jiewei Qian
[1] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[2] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[3] Rubem Pereira,et al. Future internet: trends and challenges , 2015, Int. J. Space Based Situated Comput..
[4] Danai Chasaki,et al. Security challenges in the internet of things , 2015, Int. J. Space Based Situated Comput..
[5] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[6] Gurpreet Singh Matharu,et al. The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).
[7] Nan Zhang,et al. The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Haixia Xu,et al. A secure delegation scheme of large polynomial computation in multi-party cloud , 2015, Int. J. Grid Util. Comput..
[9] Alfredo De Santis,et al. An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[10] Muhammad Zubair Shafiq,et al. A large scale exploratory analysis of software vulnerability life cycles , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[11] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[12] Ioan Valentin Sita. Building Control, Monitoring, Safety and Security Using Collaborative Systems , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[13] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[14] Renu Taneja,et al. A time stamp-based elliptic curve cryptosystem for wireless ad-hoc sensor networks , 2014, Int. J. Space Based Situated Comput..
[15] Leyla Bilge,et al. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.
[16] Mike Shema. Cross-Site Scripting , 2010 .
[17] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[18] Christoph Sorge,et al. A privacy-friendly architecture for future cloud computing , 2013, Int. J. Grid Util. Comput..