Security for Multihop Wireless Networks
暂无分享,去创建一个
[1] Yuanyuan Zhou,et al. Design of embedded secure gateway based on 6LoWPAN , 2011, 2011 IEEE 13th International Conference on Communication Technology.
[2] Wei Luo,et al. The Analysis of 6LowPAN Technology , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.
[3] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[4] Michael Starsinic. System architecture challenges in the home M2M network , 2010, 2010 IEEE Long Island Systems, Applications and Technology Conference.
[5] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[6] Sachin Agarwal,et al. Operator-based over-the-air M2M wireless sensor network security , 2010, 2010 14th International Conference on Intelligence in Next Generation Networks.
[7] Yuchen Zhang,et al. Architecture and real-time characteristics analysis of the cyber-physical system , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[8] Nei Kato,et al. An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.
[9] Chen Hongsong,et al. Security and trust research in M2M system , 2011, Proceedings of 2011 IEEE International Conference on Vehicular Electronics and Safety.
[10] James Won-Ki Hong,et al. Towards management of machine to machine networks , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.
[11] Xiaohui Liang,et al. GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.
[12] Albrecht Schmidt,et al. What Can the Internet of Things Do for the Citizen? Workshop at Pervasive 2010 , 2010, IEEE Pervasive Comput..
[13] F StarsinicMichael,et al. System architecture challenges in the home M2M network , 2010, LISAT 2010.
[14] Eui-nam Huh,et al. A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[15] Min Chen,et al. Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..
[16] Lui Sha,et al. Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[17] Djamal Zeghlache,et al. Energy efficiency in M2M networks: A cooperative key establishment system , 2011, 2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).