-
1
-
-
84867732344
-
-
EU FP7 project IoT@Work, Web site
-
EU FP7 project IoT@Work, Web site: https://www.iot-at-work.eu/
-
-
-
-
2
-
-
78650942089
-
-
March ISBN 978-92-79-15088- 3, doi:10.2759/26127
-
H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé (editors), Vision and Challenges for Realising the Internet of Things, March 2010, ISBN 978-92-79-15088- 3, doi:10.2759/26127
-
(2010)
Vision and Challenges for Realising the Internet of Things
-
-
Sundmaeker, H.1
Guillemin, P.2
Friess, P.3
Woelfflé, S.4
-
6
-
-
70449671899
-
-
PROFIBUS Nutzerorganisation e.V., version 1.0, March
-
PROFIBUS Nutzerorganisation e.V., "PROFINET security guideline", version 1.0, March 2005
-
(2005)
PROFINET Security Guideline
-
-
-
7
-
-
84867736879
-
-
IEEE 802.1AR, December
-
IEEE 802.1AR, "Secure device identity", December 2009
-
(2009)
Secure Device Identity
-
-
-
8
-
-
51049122345
-
-
RFC 5280, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, May
-
RFC 5280, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profiles", S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, May 2008, http://tools.ietf.org/html/rfc5280
-
(2008)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profiles
-
-
-
9
-
-
84887394939
-
-
October IETF Internet Draft
-
B. Sarikaya, Y. Ohba, R. Moskowitz, Z. Cao, R. Cragie, "Security Bootstrapping of Resource-Constrained Devices", October 2011, IETF Internet Draft, http://tools.ietf.org/html/draft-sarikaya-core-sbootstrapping-03
-
(2011)
Security Bootstrapping of Resource-Constrained Devices
-
-
Sarikaya, B.1
Ohba, Y.2
Moskowitz, R.3
Cao, Z.4
Cragie, R.5
-
10
-
-
0038341106
-
A Key-Management Scheme for Distributed Sensor Networks
-
ACM Press, ISBN:1-58113-612-9, doi: 10.1145/586110.586117
-
L. Eschenauer, V. D. Gligor, A Key-Management Scheme for Distributed Sensor Networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, 2002, pp. 41-47, ISBN:1-58113-612-9, doi: 10.1145/586110.586117
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
11
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
ISBN: 0-7695-1940-7, doi: 10.1109/SECPRI.2003.1199337
-
H. Chan, A. Perrig, D. Song, "Random key predistribution schemes for sensor networks", Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197 - 213, ISBN: 0-7695-1940-7, doi: 10.1109/SECPRI.2003. 1199337
-
Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
12
-
-
84867733210
-
Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments
-
November ISBN: 978-1-61208-105-2
-
R. Falk, S. Fries, "Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments", Service Computation 2010, November 2010, pp. 104-110, ISBN: 978-1-61208-105-2
-
(2010)
Service Computation 2010
, pp. 104-110
-
-
Falk, R.1
Fries, S.2
|