Utilising the Tor Network for IoT Addressing and Connectivity
暂无分享,去创建一个
Sebastian Hudert | Felix W. Baumann | Uwe Breitenbücher | Michael Falkenthal | Ulrich Odefey | F. Baumann | Uwe Breitenbücher | Michael Falkenthal | Sebastian Hudert | U. Odefey
[1] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[2] Frank Leymann,et al. Comparison of IoT platform architectures: A field study based on a reference architecture , 2016, 2016 Cloudification of the Internet of Things (CIoT).
[3] Frank Leymann,et al. Internet of Things Patterns for Devices , 2017 .
[4] Frank Leymann,et al. OpenTOSCA for the 4th Industrial Revolution: Automating the Provisioning of Analytics Tools based on Apache Flink , 2016, IOT.
[5] Roger Dingledine,et al. Methodically Modeling the Tor Network , 2012, CSET.
[6] Frank Leymann,et al. From Pattern Languages to Solution Implementations , 2014 .
[7] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[8] Frank Leymann,et al. Internet of things patterns , 2016, EuroPLoP.
[9] Ramzi A. Haraty,et al. The TOR data communication system , 2014, Journal of Communications and Networks.
[10] Jie Wu,et al. Survey on anonymous communications in computer networks , 2010, Comput. Commun..
[11] Wolfgang Mahnke,et al. OPC UA - Service-oriented Architecture for Industrial Applications , 2006, Softwaretechnik-Trends.
[12] Frank Leymann,et al. Requirements and Enforcement Points for Policies in Industrial Data Sharing Scenarios , 2017 .
[13] Dieter Roller,et al. Universal API for 3D printers , 2016, GI-Jahrestagung.
[14] Dieter Roller,et al. Abstract API for 3D printing hardware and software resources , 2017 .
[15] Sebastian Hudert,et al. Industrial Data Sharing with Data Access Policy , 2017, CDVE.