Internet of Things (IoT): An Overview of Applications and Security Issues Regarding Implementation
暂无分享,去创建一个
[1] Xingzhi Lin. Logistic geographical information detecting unified information system based on Internet of Things , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[2] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[3] Dimosthenis Kyriazis,et al. Sustainable smart city IoT applications: Heat and electricity management & Eco-conscious cruise control for public transportation , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[4] Gaetano Marrocco,et al. NIGHT-Care: A Passive RFID System for Remote Monitoring and Control of Overnight Living Environment , 2014, ANT/SEIT.
[5] Luigi Atzori,et al. Implementation of an Experimental Platform for the Social Internet of Things , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Harshal D. Misalkar,et al. Review of Internet of Things in development of smart cities with data management & privacy , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[7] Michele Zorzi,et al. Health care applications: a solution based on the internet of things , 2011, ISABEL '11.
[8] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[9] Vlad Trifa,et al. SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.
[10] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[11] Gurudatt Kulkarni,et al. “RFID security issues & challenges” , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[12] T. Wark,et al. Wireless localisation network for patient tracking , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[13] Chuan Zhang,et al. A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[14] Wilhelm Stork,et al. Empirical Analysis and Ranging Using Environment and Mobility Adaptive RSSI Filter for Patient Localization during Disaster Management , 2009, 2009 Fifth International Conference on Networking and Services.
[15] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[16] Kevin Kelly,et al. SODA: Service Oriented Device Architecture , 2006, IEEE Pervasive Computing.
[17] Wei Li,et al. An Immune Theory Based Health Monitoring and Risk Evaluation of Earthen Sites with Internet of Things , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[18] Julien Bourgeois,et al. ALMA, A Logistic Mobile Application Based on Internet of Things , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[19] Zhigao Du,et al. Design and Implementation of Safety Management System for Oil Depot Based on Internet of Things , 2012, GreenCom.
[20] Yu Zhang,et al. The Application of Internet of Things in Social Network , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.
[21] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[22] Frédéric Thiesse,et al. Sensor Applications in the Supply Chain: The Example of Quality-Based Issuing of Perishables , 2008, IOT.
[23] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[24] Ross A. Knepper,et al. RF-compass: robot object manipulation using RFIDs , 2013, MobiCom.
[25] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[26] Srijith Krishnan Nair,et al. Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.
[27] Gurpreet Singh Matharu,et al. The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).
[28] James Pasley,et al. How BPEL and SOA Are Changing Web Services Development , 2005, IEEE Internet Comput..
[29] Atul Negi,et al. Principle application and vision in Internet of Things (IoT) , 2015, International Conference on Computing, Communication & Automation.
[30] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[31] Abdulsalam Yassine,et al. Equipment Location in Hospitals Using RFID-Based Positioning System , 2012, IEEE Transactions on Information Technology in Biomedicine.
[32] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[33] Dominique Guinard,et al. Building a Smart Hospital using RFID Technologies , 2006, ECEH.
[34] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[35] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[36] Renwang Li,et al. Based on the Internet of things the supermarket chain management information system development and safety stock research , 2010, 2010 2nd International Conference on Education Technology and Computer.
[37] Luis Alonso,et al. WSN4QoL: A WSN-Oriented Healthcare System Architecture , 2014, Int. J. Distributed Sens. Networks.
[38] Tein-Yaw Chung,et al. MUL-SWoT: A Social Web of Things Platform for Internet of Things Application Development , 2014, 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom).
[39] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[40] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[41] Rosli Salleh,et al. Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[42] Alois Knoll,et al. Services to the Field: An Approach for Resource Constrained Sensor/Actor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.