Secure Data Provenance for the Internet of Things
暂无分享,去创建一个
[1] M. Aman. Physical Unclonable Functions for IoT Security , 2016 .
[2] Elisa Bertino. Big data security and privacy , 2016, BigData.
[3] References , 1971 .
[4] Ramesh Karri,et al. Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.
[5] Sanjay Jha,et al. Securing data provenance in body area networks using lightweight wireless link fingerprints , 2013, TrustED '13.
[6] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[7] Roel Maes. Physically Unclonable Functions: Concept and Constructions , 2013 .
[8] Xiang-Yang Li,et al. Wireless Device Authentication Using Acoustic Hardware Fingerprints , 2015, BigCom.
[9] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[10] Roel Maes,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2013 .
[11] Elisa Bertino,et al. Data Security and Privacy in the IoT , 2016, EDBT.
[12] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[13] Satyen Abrol,et al. Data Security and Privacy , 2016 .