-
2
-
-
84988272488
-
Security considerations in the IP-based internet of things
-
Mar.
-
O. Garcia-Morchon et al., "Security Considerations in the IP-Based Internet of Things," IETF, Mar. 2011; http://tools.ietf.org/html/draft- garcia-core-security.
-
(2011)
IETF
-
-
Garcia-Morchon, O.1
-
3
-
-
79952000947
-
A cross-layer approach for integrating security mechanisms in sensor networks architectures
-
R. Roman, J. Lopez, and P. Najera, "A Cross-layer Approach for Integrating Security Mechanisms in Sensor Networks Architectures," Wireless Comm. and Mobile Computing, vol. 11, no. 2, 2011, pp. 267-276.
-
(2011)
Wireless Comm. and Mobile Computing
, vol.11
, Issue.2
, pp. 267-276
-
-
Roman, R.1
Lopez, J.2
Najera, P.3
-
4
-
-
84874338361
-
6LoWPAN extension for ipsec
-
Internet Architecture Board, Mar.
-
S. Raza, T. Voigt, and U. Roedig, "6LoWPAN Extension for IPsec," Proc. Workshop Interconnecting Smart Objects with the Internet, Internet Architecture Board, Mar. 2011; www.iab.org/about/workshops/ smartobjects.
-
(2011)
Proc. Workshop Interconnecting Smart Objects with the Internet
-
-
Raza, S.1
Voigt, T.2
Roedig, U.3
-
5
-
-
79955712919
-
Key management systems for sensor networks in the context of the internet of things
-
Mar.
-
R. Roman et al., "Key Management Systems for Sensor Networks in the Context of the Internet of Things," Computers & Electrical Eng., Mar. 2011, pp. 147-159.
-
(2011)
Computers & Electrical Eng.
, pp. 147-159
-
-
Roman, R.1
-
6
-
-
58149098039
-
Support for identity management in ambient environments-The hydra approach
-
IEEE CS Press
-
H. Akram and M. Hoffmann, "Support for Identity Management in Ambient Environments-The Hydra Approach," Proc. IEEE Int'l Conf. Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services (I-CENTRIC 08), IEEE CS Press, 2008, pp. 371-377.
-
(2008)
Proc. IEEE Int'l Conf. Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services (I-CENTRIC 08)
, pp. 371-377
-
-
Akram, H.1
Hoffmann, M.2
-
7
-
-
64849115259
-
Identities in the future internet of things
-
Mar.
-
A. Sarma and J. Girão, "Identities in the Future Internet of Things," Wireless Personal Comm., Mar. 2009, pp. 353-363.
-
(2009)
Wireless Personal Comm.
, pp. 353-363
-
-
Sarma, A.1
Girao, J.2
-
8
-
-
80052849760
-
A holistic approach to RFID Security and privacy
-
E. Rekleitis, P. Rizomiliotis, and S. Gritzalis, "A Holistic Approach to RFID Security and Privacy," Proc. 1st Int'l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory, 2010; www.nics.uma.es/seciot10/files/pdf/rekleitis-seciot10-paper. pdf.
-
(2010)
Proc. 1st Int'l Workshop Security of the Internet of Things (SecIoT 10), Network Information and Computer Security Laboratory
-
-
Rekleitis, E.1
Rizomiliotis, P.2
Gritzalis, S.3
-
10
-
-
84865520786
-
The privacy coach: Supporting customer privacy in the internet of things
-
Radboud Univ., May
-
G. Broenink et al., "The Privacy Coach: Supporting Customer Privacy in the Internet of Things," Proc. Workshop What Can the Internet of Things Do for the Citizen? (CIOT 2010); Radboud Univ., May 2010; http://dare.ubn.ru.nl/ bitstream/2066/83839/1/83839.pdf.
-
(2010)
Proc. Workshop What Can the Internet of Things Do for the Citizen? (CIOT 2010)
-
-
Broenink, G.1
|