Security in the Internet of Things
暂无分享,去创建一个
[1] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[2] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[3] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[4] Fadi Al-Turjman,et al. CAR Approach for the Internet of Things , 2016, Canadian Journal of Electrical and Computer Engineering.
[5] Anjali Sardana,et al. Identity management framework for cloud based internet of things , 2012, SecurIT '12.
[6] Habtamu Abie,et al. Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.
[7] Soma Bandyopadhyay,et al. Why not keep your personal data secure yet private in IoT?: Our lightweight approach , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[8] Bryan Scotney,et al. Smart City Architecture and its Applications Based on IoT , 2015, ANT/SEIT.
[9] Roberto Di Pietro,et al. Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..
[10] Xu Xiaohui,et al. Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.
[11] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[12] Lin Li,et al. Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.
[13] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[14] Hafiz Farooq Ahmad,et al. A lightweight message authentication scheme for Smart Grid communications in power sector , 2016, Comput. Electr. Eng..
[15] Jari Veijalainen,et al. Security and privacy threats in IoT architectures , 2012, BODYNETS.
[16] Yang Lijun,et al. Security Architecture and Key Technologies for IoT/CPS , 2011 .
[17] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[18] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[19] Dorothy E. Denning. Stuxnet: What Has Changed? , 2012, Future Internet.
[20] Sathish Alampalayam Kumar,et al. Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[21] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[22] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[23] Susana Sargento,et al. Scalable qos-aware mobility for future mobile operators , 2006, IEEE Communications Magazine.
[24] Steven Furnell. Making security usable: Are things improving? , 2007, Comput. Secur..
[25] Do-Yeon Kim. Cyber security issues imposed on nuclear power plants , 2014 .
[26] Rolf H. Weber,et al. Internet of things - Governance quo vadis? , 2013, Comput. Law Secur. Rev..
[27] Sanggon Lee,et al. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things , 2014, Sensors.
[28] Young-Sik Jeong,et al. A secure and scalable storage system for aggregate data in IoT , 2015, Future Gener. Comput. Syst..
[29] Ioannis Lambadaris,et al. PRE-Fog: IoT trace based probabilistic resource estimation at Fog , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[30] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[31] Manik Lal Das,et al. RFID security in the context of "internet of things" , 2012, SecurIT '12.