Security techniques for the WSN link layer within military IoT
暂无分享,去创建一个
Janusz Furtak | Jan Chudzikiewicz | Zbigniew Zielinski | Z. Zieliński | J. Furtak | J. Chudzikiewicz
[1] Yu Hui,et al. Study on application modes of military Internet of Things (MIOT) , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[2] Janusz Furtak,et al. Secure protocol for wireless communication within internet of military things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[3] Janusz Furtak,et al. Fault-tolerant techniques for the Internet of Military Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[4] Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .
[5] Konrad S. Wrona. Securing the Internet of Things a military perspective , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[6] Jessye Dos Santos,et al. Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.
[7] Hermann Wietgrefe,et al. A NNEC-compliant approach for a Future Mission Network , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.