IoT Use Cases and Implementations
暂无分享,去创建一个
[1] Djamel Tandjaoui,et al. A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[2] Nai-Wei Lo,et al. A Lightweight Continuous Authentication Protocol for the Internet of Things , 2018, Sensors.
[3] Abderrahim Marzouk,et al. A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy , 2017 .
[4] G. Hankey,et al. The global and regional burden of stroke. , 2013, The Lancet. Global health.
[5] Walid Saad,et al. Authentication of Everything in the Internet of Things: Learning and Environmental Effects , 2018, ArXiv.
[6] Vladimir Vujovic,et al. Internet of Things Based E-health Systems: Ideas, Expectations and Concerns , 2017, Handbook of Large-Scale Distributed Computing in Smart Healthcare.
[7] Ítalo S. Cunha,et al. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle , 2016, SenSys.
[8] Susanna Spinsante,et al. Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[9] Amir Manzoor. Securing Device Connectivity in the Industrial Internet of Things (IoT) , 2016 .
[10] Zhiyuan Tan,et al. Security for Cyber-Physical Systems in Healthcare , 2017 .
[11] Subbarayan Venkatesan,et al. Authentication of IoT Device and IoT Server Using Secure Vaults , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).