Comparison of security level and current consumption of security implementations for MQTT
暂无分享,去创建一个
[1] Matthew J. B. Robshaw,et al. Algebraic aspects of the advanced encryption standard , 2006 .
[2] Ramesh Karri,et al. Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..
[3] G. Fitzgerald,et al. 'I. , 2019, Australian journal of primary health.
[4] Alasdair Gilchrist. Industry 4.0: The Industrial Internet of Things , 2016 .
[5] Claes Wohlin,et al. Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.
[6] Robert T. Braden,et al. Requirements for Internet Hosts - Communication Layers , 1989, RFC.
[7] Nigel P. Smart,et al. Cryptography Made Simple , 2015, Information Security and Cryptography.
[8] Umesh Hodeghatta Rao,et al. The InfoSec Handbook , 2014, Apress.
[9] Tsuyoshi Murata,et al. {m , 1934, ACML.
[10] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[11] R. Mondal,et al. Internet of Things and Wireless Sensor Network for Smart Cities , 2017 .
[12] Sanjay Kumar Madria,et al. Sensor networks: an overview , 2003 .
[13] Ananthi Kaliyamoorthy,et al. A Survey on Hardware and Software Optimization of Microprocessors for Low Power Consumption , 2011 .
[14] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[15] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[16] Jin B. Hong,et al. Towards scalable security analysis using multi-layered security models , 2016, J. Netw. Comput. Appl..