End-to-End IoT Security Middleware for Cloud-Fog Communication
暂无分享,去创建一个
[1] Djamel Tandjaoui,et al. A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).
[2] Jega Anish Dev. Usage of botnets for high speed MD5 hash cracking , 2013 .
[3] Marjorie Skubic,et al. Automated In-Home Fall Risk Assessment and Detection Sensor System for Elders. , 2015, The Gerontologist.
[4] Jan Zibuschka,et al. Securing systems on the Internet of Things via physical properties of devices and communications , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.
[5] Mihail Popescu,et al. Panacea's Glass: Mobile Cloud Framework for Communication in Mass Casualty Disaster Triage , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[6] Giuseppe Piro,et al. A standard compliant security framework for IEEE 802.15.4 networks , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[7] Hannes Tschofenig,et al. Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[8] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[9] D. Lee,et al. Hash Function Vulnerability Index and Hash Chain Attacks , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.
[10] Magdy A. Bayoumi,et al. Secure End-to-End key establishment protocol for resource-constrained healthcare sensors in the context of IoT , 2016, 2016 International Conference on High Performance Computing & Simulation (HPCS).
[11] Vassilis Kostakos,et al. Large-scale offloading in the Internet of Things , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[12] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[13] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).