-
1
-
-
34248219805
-
Research on China Internet of Things services and management
-
(in Chinese)
-
Ning Huan-Sheng, Zhang Yu, Liu Fang-Li, Liu Wen-Ming et al. Research on China Internet of Things services and management. Acta Electronica Sinica, 2006, 34(12A): 2514-2517(in Chinese)
-
(2006)
Acta Electronica Sinica
, vol.34
, Issue.12 A
, pp. 2514-2517
-
-
Ning, H.-S.1
Zhang, Y.2
Liu, F.-L.3
Liu, W.-M.4
-
4
-
-
77956877124
-
The Internet of Things: A survey
-
Luigi Atzori, Antonio Iera, Giacomo Morabito. The Internet of Things: A survey. Computer Networks, 2010, 54(1): 2787-2805
-
(2010)
Computer Networks
, vol.54
, Issue.1
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
74949143896
-
Internet of Things-New security and privacy challenges
-
Weber Rolf H. Internet of Things-New security and privacy challenges. Computer Law & Security Review, 2010, 26(1): 23-30
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber Rolf, H.1
-
6
-
-
78650936636
-
Research on global Internet of Things' developments and it's lonstruction in China
-
(in Chinese)
-
Ning Huan-Sheng, Xu Qun-Yu. Research on global Internet of Things' developments and it's lonstruction in China. Acta Electronica Sinica, 2010, 38(11): 2591-2599(in Chinese)
-
(2010)
Acta Electronica Sinica
, vol.38
, Issue.11
, pp. 2591-2599
-
-
Ning, H.-S.1
Xu, Q.-Y.2
-
7
-
-
80052687700
-
Network information security architecture based on Internet of Things
-
(in Chinese)
-
Liu Yan-Bing, Hu Wen-Ping, Du Jiang. Network information security architecture based on Internet of Things. ZTE Technology Journal, 2011, 17(1): 17-20(in Chinese)
-
(2011)
ZTE Technology Journal
, vol.17
, Issue.1
, pp. 17-20
-
-
Liu, Y.-B.1
Hu, W.-P.2
Du, J.3
-
8
-
-
68749088435
-
Design of anonymous authentication protocol for RFID
-
(in Chinese)
-
Deng Miao-Lei, Ma Jian-Feng, Zhou Li-Hua. Design of anonymous authentication protocol for RFID. Journal on Communications, 2009, 30(7): 20-26(in Chinese)
-
(2009)
Journal on Communications
, vol.30
, Issue.7
, pp. 20-26
-
-
Deng, M.-L.1
Ma, J.-F.2
Zhou, L.-H.3
-
9
-
-
33744964854
-
Design and analysis of cryptographic protocols for RFID
-
(in Chinese)
-
Zhou Yong-Bin, Feng Deng-Guo. Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers, 2006, 29(4): 581-589(in Chinese)
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.4
, pp. 581-589
-
-
Zhou, Y.-B.1
Feng, D.-G.2
-
10
-
-
65349109748
-
Research on Hash-based RFID security authentication protocol
-
(in Chinese)
-
Ding Zhen-Hua, Li Jin-Tao, Feng Bo. Research on Hash-based RFID security authentication protocol. Journal of Computer Research and Development, 2009, 46(4): 583-592(in Chinese)
-
(2009)
Journal of Computer Research and Development
, vol.46
, Issue.4
, pp. 583-592
-
-
Ding, Z.-H.1
Li, J.-T.2
Feng, B.3
-
11
-
-
80052673108
-
Privacy and data protection impact assessment framework for RFID applications
-
January 12, 2011
-
GS1, European Commission. Privacy and Data Protection Impact Assessment Framework for RFID Applications. January 12, 2011. http://ec.europa.eu/information_society/policy/rfid/ documents/infso-2011-00068.pdf
-
(2011)
-
-
-
12
-
-
51949113299
-
The EPCglobal architecture framework (V1.4)
-
December 15, 2010
-
Ken T, Felice A, Henri B, Paul D et al. The EPCglobal Architecture Framework (V1.4). December 15, 2010. http://www.gs1.org/gsmp/kc/epcglobal/architecture/ architecture_1_4-framework- 20101215.pdf
-
(2010)
-
-
Ken, T.1
Felice, A.2
Henri, B.3
Paul, D.4
-
13
-
-
77958560539
-
-
Beijing: Publishing House of Electronic Industry, (in Chinese)
-
Ning Huan-Sheng, Zhang Yan. RFID and IOT-RF, Middleware, Analysis and Services. Beijing: Publishing House of Electronic Industry, 2008: 108-235(in Chinese)
-
(2008)
RFID and IOT-RF, Middleware, Analysis and Services
, pp. 108-235
-
-
Ning, H.-S.1
Zhang, Y.2
-
15
-
-
78149388434
-
A controllable and trusted anonymous communication scheme
-
(in Chinese)
-
Wu Zhen-Qiang, Zhou Yan-Wei, Qiao Zi-Rui. A controllable and trusted anonymous communication scheme. Chinese Journal of Computers, 2010, 33(9): 1686-1702(in Chinese)
-
(2010)
Chinese Journal of Computers
, vol.33
, Issue.9
, pp. 1686-1702
-
-
Wu, Z.-Q.1
Zhou, Y.-W.2
Qiao, Z.-R.3
-
16
-
-
70350525668
-
Trusted and anonymous authentication scheme for wireless networks
-
(in Chinese)
-
Yang Li, Ma Jian-Feng, Zhu Jian-Ming. Trusted and anonymous authentication scheme for wireless networks. Journal on Communications, 2009, 30(9): 29-35(in Chinese)
-
(2009)
Journal on Communications
, vol.30
, Issue.9
, pp. 29-35
-
-
Yang, L.1
Ma, J.-F.2
Zhu, J.-M.3
|