The Internet of Things: A survey
暂无分享,去创建一个
[1] Vinton G. Cerf,et al. Specification of Internet Transmission Control Program , 1974, RFC.
[2] T. V. Lakshman,et al. The performance of TCP/IP for networks with high bandwidth-delay products and random loss , 1997, TNET.
[3] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[4] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[5] Lorrie Faith Cranor,et al. The platform for privacy preferences , 1999, CACM.
[6] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[7] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[8] Charles E. Perkins,et al. IP Mobility Support for IPv4 , 2002, RFC.
[9] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[10] Pramod K. Varshney,et al. QoS Support in Wireless Sensor Networks: A Survey , 2004, International Conference on Wireless Networks.
[11] N. Gershenfeld,et al. The Internet of Things , 2016 .
[12] Ian F. Akyildiz,et al. A survey of mobility management in next-generation all-IP-based wireless systems , 2004, IEEE Wirel. Commun..
[13] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[14] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[15] James Pasley,et al. How BPEL and SOA Are Changing Web Services Development , 2005, IEEE Internet Comput..
[16] Kori Inkpen Quinn,et al. Just point and click?: using handhelds to interact with paper maps , 2005, Mobile HCI.
[17] Hakan Deliç,et al. Wireless sensor networks for intrusion detection: packet traffic modeling , 2006, IEEE Communications Letters.
[18] Sébastien Canard,et al. Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.
[19] Kevin Kelly,et al. SODA: Service Oriented Device Architecture , 2006, IEEE Pervasive Computing.
[20] Ken Sakamura,et al. Challenges in the age of ubiquitous computing: a case study of T-Engine, an open development platform for embedded systems , 2006, ICSE.
[21] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[22] Bernard Eydt,et al. Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .
[23] Jacques Reverdy,et al. RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.
[24] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[25] Daeyoung Kim,et al. The EPC Sensor Network for RFID and WSN Integration Infrastructure , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[26] D.I. Kaklamani,et al. A Proxy for Privacy: the Discreet Box , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".
[27] Eddie Kohler,et al. Harbor: software-based memory protection for sensor nodes , 2007, IPSN '07.
[28] Christian Floerkemeier,et al. RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.
[29] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[30] Artem Katasonov,et al. Smart Semantic Middleware for the Internet of Things , 2008, ICINCO-ICSO.
[31] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[32] Frédéric Thiesse,et al. Sensor Applications in the Supply Chain: The Example of Quality-Based Issuing of Perishables , 2008, IOT.
[33] E Xample A Pplications. Revisiting Smart Dust with RFID Sensor Networks , 2008 .
[34] Vlad Trifa,et al. SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.
[35] Elgar Fleisch,et al. Using Sensor Information to Reduce the Carbon Footprint of Perishable Goods , 2009, IEEE Pervasive Computing.
[36] E. Fleisch,et al. Mobile Sales Assistant - An NFC-Based Product Information System for Retailers , 2009, 2009 First International Workshop on Near Field Communication.
[37] Dusit Niyato,et al. Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization , 2009, IEEE Journal on Selected Areas in Communications.
[38] Albrecht Schmidt,et al. Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.
[39] Alois Knoll,et al. Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[40] Gilles Grimaud,et al. The Web of Things: Interconnecting Devices with High Usability and Performance , 2009, 2009 International Conference on Embedded Software and Systems.
[41] Jonathan W. Hui,et al. Internet Protocol for Smart Objects (ipso) Alliance , 2009 .
[42] Vlad Trifa,et al. Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .
[43] Leilani Battle,et al. Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.
[44] Francesco Amato,et al. Sensor-Oriented Passive RFID , 2010 .
[45] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[46] Olivier Savry,et al. Security and Privacy Protection of Contactless Devices , 2010 .
[47] Mikko Tapani Karaiste. Delete: The virtue of forgetting in the digital age , 2010 .
[48] George Bilgere. Anywhere , 2011 .