Security of ONS service for applications of the Internet of Things and their pilot implementation in academic network
暂无分享,去创建一个
[1] M. Kijonka,et al. Coal industry technologies simulation with virtual reality utilization , 2012, Proceedings of the 13th International Carpathian Control Conference (ICCC).
[2] Juraj Vaculík,et al. Principles of Selection, Implementation and Utilization of RFID in Supply Chain Management , 2009 .
[3] Yuwei Zhang,et al. RFID Information Acquisition: An Analysis and Comparison between ONS and LDAP , 2010, 2009 First International Conference on Information Science and Engineering.
[4] Eric Vyncke,et al. IPv6 Security , 2008 .
[5] Klaus Finkenzeller,et al. Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .
[6] Elisa Bertino,et al. RFID Security and Privacy , 2013, Synthesis Lectures on Information Security, Privacy, and Trust.
[7] Youngsong Mun,et al. Understanding IPv6 , 2005 .
[8] Miroslav Voznak,et al. Wireless sensors in complex networks: study and performance evaluation of a new hybrid model , 2014, Sensing Technologies + Applications.
[9] Yi Xie,et al. A security query protocol of ONS in EPC system , 2012, Anti-counterfeiting, Security, and Identification.
[10] Salvatore Marano,et al. Complex networks: Study and performance evaluation with hybrid model for Wireless Sensor Networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[11] Ken Buszta. Security Management , 2007, Information Security Management Handbook, 6th ed..
[12] Natalia Andreeva,et al. Information Security Integral Engineering Technique and its Application in ISMS Design , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[13] Nemai Chandra Karmakar. Advanced RFID Systems, Security, and Applications , 2012 .
[14] Vladimir Kebo. RFID TECHNOLOGY IN LOGISTICS PROCESSES , 2013 .
[15] Robert A. Scholtz,et al. Performance Analysis of , 1998 .
[16] Paula Raymond Lutui. Performance analysis of IPv4 vs. IPv6 on various operating systems using jumbo frames , 2011 .
[17] Rajendra Singh,et al. Comparative study of IPv4 & IPv6 Point to Point Architecture on various OS platforms , 2013 .
[18] In Lee. Rfid Technology Integration for Business Performance Improvement , 2014 .
[19] David Sutton. Information Risk Management: A practitioner's guide , 2014 .
[20] Yvonne Schuhmacher,et al. Rfid Handbook Fundamentals And Applications In Contactless Smart Cards And Identification , 2016 .
[21] Keum-Suk Lee,et al. A mobile agent security management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[22] Harvey Lehpamer. RFID Design Principles , 2008 .
[23] Wenhong Tian,et al. A scheme to enhance security of RFID middleware , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).