메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1867-1870

The visions, technologies, applications and security issues of internet of things

Author keywords

privacy; Radio Frequency Identification; supply chain management; the Internet of Things; Wireless Sensors Networks

Indexed keywords

INTERNET OF THINGS; RADIO FREQUENCIES; SECURITY ISSUES; THE INTERNET OF THINGS; WIRELESS SENSORS NETWORKS;

EID: 79960408982     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEBEG.2011.5881892     Document Type: Conference Paper
Times cited : (52)

References (21)
  • 4
    • 79960410878 scopus 로고    scopus 로고
    • Auto-Id Labs, 〈http://www.autoidlabs.org/〉.
  • 5
    • 79960386605 scopus 로고    scopus 로고
    • The EPCglobal Architecture Framework, Final Version 1.3, Approved 19 March
    • The EPCglobal Architecture Framework, EPCglobal Final Version 1.3, Approved 19 March 2009, 〈www.epcglobalinc.org〉.
    • (2009) EPCglobal
  • 6
    • 79960416182 scopus 로고    scopus 로고
    • for the European Commission Information Society and Media Directorate General, Networked Enterprise & RFID Unit 4, Report of the Internet of Things Workshop, Prage, Czech Republic, May
    • M. Botterman, for the European Commission Information Society and Media Directorate General, Networked Enterprise & RFID Unit 4, Internet of Things: An Early Reality of the Future Internet, Report of the Internet of Things Workshop, Prage, Czech Republic, May 2009.
    • (2009) Internet of Things: An Early Reality of the Future Internet
    • Botterman, M.1
  • 7
    • 48649100154 scopus 로고    scopus 로고
    • the Internet of Things, November
    • ITU Internet Reports, the Internet of Things, November 2005.
    • (2005) ITU Internet Reports
  • 13
  • 14
    • 79960428631 scopus 로고    scopus 로고
    • available: accessed 19 February 2009
    • Crossbow Technologies Inc., MICAz (online), available: http://www.xbow.com/Products/productdetails.aspx?sid=164, 2008 (accessed 19 February 2009).
    • (2008) MICAz (Online)
  • 17
    • 74849112037 scopus 로고    scopus 로고
    • Optimal frame size analysis for framed slotted ALOHA based RFID networks
    • doi: 10. 1016/j.comcom.2009.11.007
    • Z.G. Prodanoff, Optimal frame size analysis for framed slotted ALOHA based RFID networks, Computer Communications (2009), doi: 10. 1016/j.comcom.2009.11.007.
    • (2009) Computer Communications
    • Prodanoff, Z.G.1
  • 18
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • Luigi Atzori, Antonio Iera, Giacomo Morabito. The Internet of Things: A survey. Computer Networks. 54 (2010) 2787-2805
    • (2010) Computer Networks , vol.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 19
    • 64249111096 scopus 로고    scopus 로고
    • RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain
    • E. Abad, F. Palacio, M. Nuin, A. González de Zárate, A. Juarros, J.M. Gómez, S. Marco.RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain. Journal of Food Engineering. 93 (2009) 394-399
    • (2009) Journal of Food Engineering , vol.93 , pp. 394-399
    • Abad, E.1    Palacio, F.2    Nuin, M.3    González De Zárate, A.4    Juarros, A.5    Gómez, J.M.6    Marco, S.7
  • 20
    • 71649100806 scopus 로고    scopus 로고
    • On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks
    • David E. Boyle, Thomas Newe. On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks. Sensors and Actuators A: Physical. 156 (2009) 394-405
    • (2009) Sensors and Actuators A: Physical , vol.156 , pp. 394-405
    • Boyle, D.E.1    Newe, T.2
  • 21
    • 71649095641 scopus 로고    scopus 로고
    • Internet of things - Need for a new legal environment
    • Rolf H. Weber. Internet of things - Need for a new legal environment. Computer law & Security review. 25 (2009) 522-527.
    • (2009) Computer Law & Security Review , vol.25 , pp. 522-527
    • Weber, R.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.