A Distributed Security Mechanism for Resource-Constrained IoT Devices
暂无分享,去创建一个
[1] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[2] Oscar Garcia-Morchon,et al. Securing the IP-based Internet of Things with DTLS , 2013 .
[3] Andrzej Duda,et al. OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[4] Catherine Mulligan,et al. From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence , 2014 .
[5] Javier Rubio-Loyola,et al. Accurate real-time monitoring of bottlenecks and performance of packet trace collection , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[6] Hakima Chaouchi,et al. Introduction to the Internet of Things , 2013 .
[7] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[10] Hesham F. A. Hamed,et al. Advanced Encryption Standard Algorithm: Issues and Implementation Aspects , 2012, AMLTA.
[11] Sye Keoh,et al. A Hitchhiker's Guide to the (Datagram) Transport Layer Security Protocol for Smart Objects and Constrained Node Networks , 2013 .
[12] Peng Li,et al. WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).
[13] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[14] Allen Storey. There's nothing 'smart' about insecure connected devices , 2014, Netw. Secur..
[15] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[16] Alexandre Santos,et al. Internet of Things and Smart Objects for M-health Monitoring and Control , 2014 .
[17] Zhihua Li,et al. A Multi-layer Security Model for Internet of Things , 2012 .
[18] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[19] Flora Malamateniou,et al. Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
[20] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[21] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[22] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[23] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[24] Ali Ismail Awad,et al. Optimized hardware implementation of the advanced encryption standard algorithm , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).
[25] Rodney Landrum,et al. SQL CLR Cryptography , 2009 .
[26] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[27] Changguang Wang,et al. The Research of Security Technology in the Internet of Things , 2011, CSISE.
[28] Yacine Challal,et al. Internet of Things security and privacy: Design methods and optimization , 2015, Ad Hoc Networks.
[29] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[30] Javier Rubio-Loyola,et al. Maximizing packet loss monitoring accuracy for reliable trace collections , 2008, 2008 16th IEEE Workshop on Local and Metropolitan Area Networks.
[31] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.