Securing Satellite Internet of Things by Perceiving Content Semantics
暂无分享,去创建一个
[1] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[2] Tinghuai Ma,et al. Access Control Policy Based On Friend Circle , 2020 .
[3] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[4] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[5] Anar A. Hady. Duty Cycling Centralized Hierarchical Routing Protocol With Content Analysis Duty Cycling Mechanism for Wireless Sensor Networks , 2020, Comput. Syst. Sci. Eng..
[6] Alexander Afanasyev,et al. Named Data Networking of Things (Invited Paper) , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[7] Duo Liu,et al. A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT , 2019, Computers, Materials & Continua.
[8] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[9] Victor C. M. Leung,et al. Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.
[10] Nicola Zannone,et al. Access control in Internet-of-Things: A survey , 2019, J. Netw. Comput. Appl..
[11] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[12] Prateek Mittal,et al. EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.