메뉴 건너뛰기




Volumn 105, Issue , 2011, Pages 113-119

The research of security technology in the Internet of Things

Author keywords

defensive measures; hierarchy structure; Internet of things; security technology

Indexed keywords

APPLICATION LAYERS; DEFENSIVE MEASURES; HIERARCHY STRUCTURE; INTERNET OF THINGS; PRIVACY PROTECTION; SECURITY ISSUES; SECURITY REQUIREMENTS; SECURITY TECHNOLOGY;

EID: 80054901732     PISSN: 18675662     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-23756-0_19     Document Type: Article
Times cited : (16)

References (5)
  • 1
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things-New security and privacy challenges
    • Weber, R.H.: Internet of Things-New security and privacy challenges. Computer Law & Security Review (26), 23-30 (2010)
    • (2010) Computer Law & Security Review , vol.26 , pp. 23-30
    • Weber, R.H.1
  • 4
    • 80054924737 scopus 로고    scopus 로고
    • Research on security problems and countermeasures in internet of things
    • November
    • Nie, X., Zhang, Y., Luo, Q., Bi, X.: Research on Security Problems and Countermeasures in Internet of Things. Computer Security, 4-6 (November 2010)
    • (2010) Computer Security , pp. 4-6
    • Nie, X.1    Zhang, Y.2    Luo, Q.3    Bi, X.4
  • 5
    • 80053409890 scopus 로고    scopus 로고
    • Security model and key technology of the internet of things
    • August
    • Liu, Y., Hu, W.: Security Model and Key Technology of the Internet of Things. Digital Communication, 28-33 (August 2010)
    • (2010) Digital Communication , pp. 28-33
    • Liu, Y.1    Hu, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.