Systematic investigation and performance study of authentication and authorization techniques of Internet of Things
暂无分享,去创建一个
[1] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[2] Shiju Sathyadevan,et al. Portguard - an authentication tool for securing ports in an IoT gateway , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[3] Dhiren R. Patel,et al. Energy efficient integrated authentication and access control mechanisms for Internet of Things , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).
[4] T. Senthil Murugan,et al. Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things , 2017, Int. J. Intell. Comput. Cybern..
[5] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[6] Ahmed Serhrouchni,et al. Taxonomy of authentication techniques in Internet of Things (IoT) , 2017, 2017 IEEE 15th Student Conference on Research and Development (SCOReD).
[7] Laurence T. Yang,et al. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.
[8] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[9] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.