Analysis and design of security in Internet of things
暂无分享,去创建一个
Ling Liu | Di Guo | Xuhui Chen | Jinhua Sun | Cuihua Tian | Jiangshui Hong | D. Guo | Cuihua Tian | Xuhui Chen | Ling Liu | Jinhua Sun | Jiangshui Hong
[1] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[2] Victor C. M. Leung,et al. Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks , 2010, Mob. Networks Appl..
[3] Wenjing Lou,et al. PEACE: A Novel Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[4] Fu Chun-chang. Hash-based RFID mutual authentication protocol , 2012 .
[5] Meng Wu,et al. Research on security management for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[6] Wenjing Lou,et al. A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[7] Minho Kang,et al. Privacy and security control architecture for ubiquitous RFID healthcare system in wireless sensor networks , 2006, 2006 Digest of Technical Papers International Conference on Consumer Electronics.
[8] Leonid Smalov,et al. Energy-aware Security in M-Commerce and the Internet of Things , 2009 .
[9] Sehyun Park,et al. An intelligent self-adjusting sensor for smart home services based on ZigBee communications , 2012, IEEE Transactions on Consumer Electronics.
[10] Lin Zhu,et al. Internet of Things: Key technology, architecture and challenging problems , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.
[11] Marc Langheinrich,et al. The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings , 2008, IoT.
[12] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[13] John Lee,et al. The Wireless Sensor Network Security Protocol Research in Internet of Things , 2012 .
[14] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[15] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.