Security Issues in Internet of Things (IoT): A Survey
暂无分享,去创建一个
[1] Liangmin Wang,et al. Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection , 2012, J. Networks.
[2] Qiaoyan Wen,et al. A privacy enhanced DNS scheme for the Internet of Things , 2011 .
[3] Qiaoyan Wen,et al. An identity-based personal location system with protected privacy in IOT , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[4] David Evans,et al. Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[5] Adel Said Elmaghraby,et al. Cyber security challenges in Smart Cities: Safety, security and privacy , 2014, Journal of advanced research.
[6] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[7] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.
[8] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[9] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[10] Kian-Lee Tan,et al. Specifying Access Control Policies on Data Streams , 2007, DASFAA.
[11] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[12] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[13] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[14] Mark D. Button. Security , 2010, 5G Second Phase Explained.
[15] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[16] Yan Ling Zhao,et al. Research on Data Security Technology in Internet of Things , 2013 .
[17] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[18] A. W. Roscoe,et al. User interactive Internet of things privacy preserved access control , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[19] Ricardo Neisse,et al. Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[20] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[21] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[22] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[23] Utz Roedig,et al. Combined secure storage and communication for the Internet of Things , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[24] Manfred Tscheligi,et al. uTRUSTit - Usable Trust in the Internet of Things , 2012, TrustBus.
[25] Kian-Lee Tan,et al. CASTLE: Continuously Anonymizing Data Streams , 2011, IEEE Transactions on Dependable and Secure Computing.
[26] Olivier Hersent,et al. M2M Communications: A Systems Approach , 2012 .
[27] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.