-
1
-
-
77956877124
-
The Internet of things: A survey
-
Oct.
-
L. Atzori, A. Iera, and G. Morabito, "The Internet of things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
51249107460
-
IPV6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, goals
-
Fremont, CA, USA, RFC 4919 Aug.
-
N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPV6 over lowpower wireless personal area networks (6lowpans): Overview, assumptions, problem statement, goals," IETF, Fremont, CA, USA, RFC 4919, Aug. 2007, vol. 10.
-
(2007)
IETF
, vol.10
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
5
-
-
84861562486
-
GLoWBAL IP: An adaptive and transparent IPv6 integration in the Internet of things
-
A. J. Jara, M. A. Zamora, and A. Skarmeta, "GLoWBAL IP: An adaptive and transparent IPv6 integration in the Internet of things," Mobile Inf. Syst., vol. 8, no. 3, pp. 177-197, 2012.
-
(2012)
Mobile Inf. Syst.
, vol.8
, Issue.3
, pp. 177-197
-
-
Jara, A.J.1
Zamora, M.A.2
Skarmeta, A.3
-
6
-
-
84924277319
-
The constrained application protocol (COAP)
-
Fremont, CA, USA, RFC 7252, Jun.
-
Z. Shelby, K. Hartke, and C. Bormann, "The constrained application protocol (COAP)," IETF, Fremont, CA, USA, RFC 7252, Jun. 2014, vol. 10.
-
(2014)
IETF
, vol.10
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
7
-
-
84898603536
-
Semantic web of things: An analysis of the application semantics for the IoT moving towards the IoT convergence
-
Apr.
-
A. J. Jara et al., "Semantic web of things: An analysis of the application semantics for the IoT moving towards the IoT convergence," Int. J. Web Grid Serv., vol. 10, no. 2/3, pp. 244-272, Apr. 2014.
-
(2014)
Int. J. Web Grid Serv.
, vol.10
, Issue.2-3
, pp. 244-272
-
-
Jara, A.J.1
-
8
-
-
84928029704
-
Security and privacy challenges in the Internet of things
-
C. P. Mayer, "Security and privacy challenges in the Internet of things," Electron. Commun. Eur. Assoc. Sci. Technol., vol. 17, pp. 1-12, 2009.
-
(2009)
Electron. Commun. Eur. Assoc. Sci. Technol.
, vol.17
, pp. 1-12
-
-
Mayer, C.P.1
-
9
-
-
80052680150
-
An overview of privacy and security issues in the Internet of things
-
NewYork, NY, USA: Springer- Verlag
-
C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the Internet of things," in The Internet of Things. NewYork, NY, USA: Springer-Verlag, 2010, pp. 389-395.
-
(2010)
The Internet of Things
, pp. 389-395
-
-
Medaglia, C.M.1
Serbanati, A.2
-
10
-
-
84861997111
-
Internet of things: Vision applications & research challenges
-
Sep.
-
D. Miorandi, S. Sicari, F. Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications & research challenges," Ad Hoc Netw., vol. 10, no. 7, pp. 1497-1516, Sep. 2012.
-
(2012)
Ad Hoc Netw.
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
Pellegrini, F.3
Chlamtac, I.4
-
11
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of things
-
Jul.
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, Jul. 2013.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
12
-
-
83555176391
-
Security challenges in the IP-based Internet of things
-
Dec.
-
T. Heer et al., "Security challenges in the IP-based Internet of things," Wireless Pers. Commun., vol. 61, no. 3, pp. 527-542, Dec. 2011.
-
(2011)
Wireless Pers. Commun.
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
-
13
-
-
84878920667
-
Enabling end-to-end secure communication between wireless sensor networks and the Internet
-
Jul.
-
H. Yu, J. He, T. Zhang, P. Xiao, and Y. Zhang, "Enabling end-to-end secure communication between wireless sensor networks and the Internet," World Wide Web, vol. 16, no. 4, pp. 1-26, Jul. 2013.
-
(2013)
World Wide Web
, vol.16
, Issue.4
, pp. 1-26
-
-
Yu, H.1
He, J.2
Zhang, T.3
Xiao, P.4
Zhang, Y.5
-
14
-
-
79959372828
-
Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications
-
Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, 2004.
-
(2004)
IEEE Std 802.11
-
-
-
15
-
-
6344233247
-
Extensible authentication protocol (eap)
-
Fremont, CA, USA, RFC Jun.
-
B. Aboba et al., "Extensible Authentication Protocol (EAP)," IETF, Fremont, CA, USA, RFC 3748, Jun. 2004.
-
(2004)
IETF
, vol.3748
-
-
Aboba, B.1
-
16
-
-
0003535506
-
Remote authentication dial in user service
-
Fremont, CA, USA, RFC Jun.
-
C. Rigney, S. Willens, A. Rubens, and W. Simpson, "Remote authentication dial in user service," IETF, Fremont, CA, USA, RFC 2865, Jun. 2000.
-
(2000)
IETF
, vol.2865
-
-
Rigney, C.1
Willens, S.2
Rubens, A.3
Simpson, W.4
-
18
-
-
84921628525
-
DCapBAC: Embedding authorization logic into smart things through ECC optimizations
-
May 2014
-
J. L. Hernández-Ramos, A. J. Jara, L. Marín, and A. F. S. Gómez, "DCapBAC: Embedding authorization logic into smart things through ECC optimizations," Int. J. Comput. Math., pp. 1-22, May 2014.
-
Int. J. Comput. Math.
, pp. 1-22
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Marín, L.3
Gómez, A.F.S.4
-
20
-
-
77957599265
-
Proposed security model and threat taxonomy for the Internet of things (IoT)
-
New York, NY, USA: Springer- Verlag
-
S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, "Proposed security model and threat taxonomy for the Internet of things (IoT)," in Recent Trends in Network Security and Applications. New York, NY, USA: Springer-Verlag, 2010, pp. 420-429.
-
(2010)
Recent Trends in Network Security and Applications
, pp. 420-429
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
21
-
-
84900391197
-
A decentralized approach for security and privacy challenges in the Internet of things
-
A. F. Skarmeta, J. L. Hernandez-Ramos, andM.Moreno, "A decentralized approach for security and privacy challenges in the Internet of things," in Proc. IEEE WF-IoT, 2014, pp. 67-72.
-
(2014)
Proc. IEEE WF-IoT
, pp. 67-72
-
-
Skarmeta, A.F.1
Hernandez-Ramos, A.2
Moreno, J.L.3
-
22
-
-
80052854156
-
Securing the Internet of things
-
Sep.
-
R. Roman, P. Najera, and J. Lopez, "Securing the Internet of things," Computer, vol. 44, no. 9, pp. 51-58, Sep. 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
23
-
-
74949143896
-
Internet of things-New security and privacy challenges
-
Jan.
-
R. H. Weber, "Internet of things-New security and privacy challenges," Comput. Law Security Rev., vol. 26, no. 1, pp. 23-30, Jan. 2010.
-
(2010)
Comput. Law Security Rev.
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
24
-
-
84928029871
-
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
-
P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications," Int. J. Distrib. Sensor Netw., vol. 14, 2014, Art. ID. 357430.
-
(2014)
Int. J. Distrib. Sensor Netw.
, vol.14
-
-
Porambage, P.1
Schmitt, C.2
Kumar, P.3
Gurtov, A.4
Ylianttila, M.5
-
25
-
-
33746613037
-
Datagram transport layer security (DTLS)
-
Fremont, CA, USA, RFC
-
E. Rescola and N. Modadugu, "Datagram transport layer security (DTLS)," IETF, Fremont, CA, USA, RFC 4347, 2006.
-
(2006)
IETF
, vol.4347
-
-
Rescola, E.1
Modadugu, N.2
-
26
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in Proc. IPSN, 2008, pp. 245-256.
-
(2008)
Proc. IPSN
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
27
-
-
84887394939
-
Security bootstrapping solution for resource-constrained devices
-
Fremont, CA, USA Draft-Sarikaya-Core-Sbootstrapping-05
-
B. Sarikaya, Y. Ohba, R. Moskowitz, Z. Cao, and R. Cragie, "Security bootstrapping solution for resource-constrained devices," IETF, Fremont, CA, USA, 2012, Draft-Sarikaya-Core-Sbootstrapping-05.
-
(2012)
IETF
-
-
Sarikaya, B.1
Ohba, Y.2
Moskowitz, R.3
Cao, Z.4
Cragie, R.5
-
28
-
-
84891683415
-
Slimfit-A HIP DEX compression layer for the IP-based Internet of things
-
R. Hummen, J. Hiller, M. Henze, and K. Wehrle, "Slimfit-A HIP DEX compression layer for the IP-based Internet of things," in Proc. IEEE 9th Int. Conf. WiMob, 2013, pp. 259-266.
-
(2013)
Proc. IEEE 9th Int. Conf. WiMob
, pp. 259-266
-
-
Hummen, R.1
Hiller, J.2
Henze, M.3
Wehrle, K.4
-
29
-
-
69649101811
-
Protocol for carrying authentication for network access (PANA)
-
Fremont, CA, USA, RFC
-
D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig, and A. Yegin, "Protocol for carrying authentication for network access (PANA)," IETF, Fremont, CA, USA, RFC 5191, 2008.
-
(2008)
IETF
, vol.5191
-
-
Forsberg, D.1
Ohba, Y.2
Patil, B.3
Tschofenig, H.4
Yegin, A.5
-
32
-
-
84887348851
-
PANATIKI: A network access control implementation based on PANA for IoT devices
-
Nov.
-
P. M. Sanchez, R. M. Lopez, and A. F. G. Skarmeta, "PANATIKI: A network access control implementation based on PANA for IoT devices," Sensors, vol. 13, no. 11, pp. 14 888-14 917, Nov. 2013.
-
(2013)
Sensors
, vol.13
, Issue.11
, pp. 14888-14917
-
-
Sanchez, P.M.1
Lopez, R.M.2
Skarmeta, A.F.G.3
-
33
-
-
62149118079
-
The eap-psk protocol: A pre-shared key extensible authentication protocol (EAP) method
-
Fremont, CA, USA, RFC
-
F. Bersani and H. Tschofenig, "The eap-psk protocol: A pre-shared key extensible authentication protocol (EAP) method," IETF, Fremont, CA, USA, RFC 4764, 2007.
-
(2007)
IETF
, vol.4764
-
-
Bersani, F.1
Tschofenig, H.2
-
34
-
-
84866349735
-
Authentication and access control in the internet of things
-
Macau, China, Jun.
-
J. Liu, Y. Xiao, and C. L. P. Chen, "Authentication and access control in the internet of things," in Proc. 32nd ICDCSW, Macau, China, Jun. 2012, pp. 588-592.
-
(2012)
Proc. 32nd ICDCSW
, pp. 588-592
-
-
Liu, J.1
Xiao, Y.2
Chen, C.L.P.3
-
35
-
-
0002262722
-
Role-based access control (rbac): Features and motivations
-
D. Ferraiolo, J. Cugini, and R. Kuhn, "Role-Based Access Control (RBAC): Features and motivations," in Proc. 11th Annu. Comput. Security Appl. Conf., 1995, pp. 241-248.
-
(1995)
Proc. 11th Annu. Comput. Security Appl. Conf.
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
36
-
-
84928029868
-
Security analysis and improvements of authentication and access control in the Internet of things
-
Aug.
-
B. Ndibanje, H.-J. Lee, and S.-G. Lee, "Security analysis and improvements of authentication and access control in the Internet of things," Sensors, vol. 14, no. 8, pp. 14 786-14 805, Aug. 2014.
-
(2014)
Sensors
, vol.14
, Issue.8
, pp. 14786-14805
-
-
Ndibanje, B.1
Lee, H.-J.2
Lee, S.-G.3
-
37
-
-
84894059526
-
An efficient authentication and access control scheme for perception layer of Internet of things
-
Jul.
-
N. Ye, Y. Zhu, R. Chuan Wang, R. Malekian, and L. Qiao-min, "An efficient authentication and access control scheme for perception layer of Internet of things," Appl. Math. Inf. Sci., vol. 8, no. 4, pp. 1617-1624, Jul. 2014.
-
(2014)
Appl. Math. Inf. Sci.
, vol.8
, Issue.4
, pp. 1617-1624
-
-
Ye, N.1
Zhu, Y.2
Chuan Wang, R.3
Malekian, R.4
Qiao-Min, L.5
-
38
-
-
33749080076
-
Attributed based access control (abac) for web services
-
Orlando, FL, USA, Jul.
-
E. Yuan and J. Tong, "Attributed Based Access Control (ABAC) for web services," in Proc. 12th IEEE ICWS, Orlando, FL, USA, Jul. 2005, pp. 561-569.
-
(2005)
Proc. 12th IEEE ICWS
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
-
39
-
-
84873426135
-
Identity Establishment and Capability based Access Control (IECAC) scheme for Internet of things
-
Taipei, Taiwan, Sep.
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity Establishment and Capability based Access Control (IECAC) scheme for Internet of things," in Proc. 15th Int. Symp. WPMC, Taipei, Taiwan, Sep. 2012, pp. 187-191.
-
(2012)
Proc. 15th Int. Symp. WPMC
, pp. 187-191
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
40
-
-
84880621938
-
A capability-based security approach to manage access control in the Internet of things
-
Sep.
-
S. Gusmeroli, S. Piccione, and D. Rotondi, "A capability-based security approach to manage access control in the Internet of things," Math. Comput. Model., vol. 58, no. 5/6, pp. 1189-1205, Sep. 2013.
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.5-6
, pp. 1189-1205
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
41
-
-
84883665974
-
Authorization framework for the Internet-of-things
-
Jun.
-
L. Seitz, G. Selander, and C. Gehrmann, "Authorization framework for the Internet-of-things," in Proc. IEEE 14th Int. Symp. WoWMoM, Jun. 2013, pp. 1-6.
-
(2013)
Proc. IEEE 14th Int. Symp. WoWMoM
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
-
42
-
-
70450170255
-
The application/json media type for javascript object notation (json)
-
Fremont, CA, USA, RFC Jul. [Online]. Available
-
D. Crockford, "The application/json Media Type for Javascript Object Notation (JSON)," IETF, Fremont, CA, USA, RFC 4627, Jul. 2006. [Online]. Available: Http://www.ietf.org/rfc/rfc4627.txt
-
(2006)
IETF
, vol.4627
-
-
Crockford, D.1
-
43
-
-
84880583164
-
Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier
-
Sep.
-
L. Marin, A. J. Jara, and A. F. Skarmeta, "Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier," Math. Comput. Model., vol. 58, no. 5/6, pp. 1155-1174, Sep. 2013.
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.5-6
, pp. 1155-1174
-
-
Marin, L.1
Jara, A.J.2
Skarmeta, A.F.3
-
44
-
-
84949116483
-
Trust extension protocol for authentication in networks oriented to management (TEPANOM)
-
New York, NY, USA: Springer- Verlag
-
A. J. Jara, "Trust extension protocol for authentication in networks oriented to management (TEPANOM)," in Availability, Reliability, Security in Information Systems. New York, NY, USA: Springer-Verlag, 2014, pp. 155-165.
-
(2014)
Availability, Reliability, Security in Information Systems
, pp. 155-165
-
-
Jara, A.J.1
-
48
-
-
84881798595
-
The sensei real world Internet architecture
-
V. Tsiatsis et al., "The sensei real world Internet architecture," in Proc. Future Internet Assembly, 2010, pp. 247-256.
-
(2010)
Proc. Future Internet Assembly
, pp. 247-256
-
-
Tsiatsis, V.1
-
49
-
-
84894141883
-
An architecture for designing future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology
-
S. Sotiriadis et al., "An architecture for designing future Internet (FI) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology," in Proc. IEEE 13th Int. Conf. BIBE, 2013, pp. 1-6.
-
(2013)
Proc. IEEE 13th Int. Conf. BIBE
, pp. 1-6
-
-
Sotiriadis, S.1
-
50
-
-
84921632273
-
Privacy-preserving security framework for a social-aware Internet of things
-
New York, NY, USA: Springer- Verlag
-
J. B. Bernabe, J. L. Hernández, M. V. Moreno, and A. F. S. Gomez, "Privacy-preserving security framework for a social-aware Internet of things," in Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. New York, NY, USA: Springer-Verlag, 2014, pp. 408-415.
-
(2014)
Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services
, pp. 408-415
-
-
Bernabe, J.B.1
Hernández, J.L.2
Moreno, M.V.3
Gomez, A.F.S.4
-
51
-
-
85019124540
-
Problem description for authorization in constrained environments
-
Fremont, CA, USA Draft-Seitz-Ace-Problem-Description-01
-
L. Seitz and G. Selander, "Problem description for authorization in constrained environments," IETF, Fremont, CA, USA, 2014, Draft-Seitz-Ace-Problem-Description-01.
-
(2014)
IETF
-
-
Seitz, L.1
Selander, G.2
-
52
-
-
79955764516
-
Internet key exchange protocol version 2 (ikev2)
-
Fremont, CA, USA, RFC 5996, Sep.
-
C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet key exchange protocol version 2 (ikev2)," IETF, Fremont, CA, USA, RFC 5996, Sep. 2010.
-
(2010)
IETF
-
-
Kaufman, C.1
Hoffman, P.2
Nir, Y.3
Eronen, P.4
-
53
-
-
84892934826
-
Lightweight MIPv6 with IPSec support
-
Jan.
-
A. J. Jara, D. Fernandez, P. Lopez, M. A. Zamora, and A. F. Skarmeta, "Lightweight MIPv6 with IPSec support," Mobile Inf. Syst., vol. 10, no. 1, pp. 37-77, Jan. 2014.
-
(2014)
Mobile Inf. Syst.
, vol.10
, Issue.1
, pp. 37-77
-
-
Jara, A.J.1
Fernandez, D.2
Lopez, P.3
Zamora, M.A.4
Skarmeta, A.F.5
-
54
-
-
84874292014
-
Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security
-
S. Raza, T. Voigt, and V. Jutvik, "Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security," in Proc. IETF Workshop Smart Object Security, 2012, pp. 1-2.
-
(2012)
Proc. IETF Workshop Smart Object Security
, pp. 1-2
-
-
Raza, S.1
Voigt, T.2
Jutvik, V.3
-
55
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Mar.
-
J. Dennis and E. V. Horn, "Programming semantics for multiprogrammed computations," Commun. ACM, vol. 9, no. 3, pp. 143-155, Mar. 1966.
-
(1966)
Commun. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.1
Horn, E.V.2
-
56
-
-
84892572915
-
Multiplication and squaring with shifting primes on OpenRISC processors with hardware multiplier
-
L. Marin, A. J. Jara, and A. F. Gómez-Skarmeta, "Multiplication and squaring with shifting primes on OpenRISC processors with hardware multiplier," J. Universal Comput. Sci., vol. 19, no. 16, pp. 2368-2384, 2013.
-
(2013)
J. Universal Comput. Sci.
, vol.19
, Issue.16
, pp. 2368-2384
-
-
Marin, L.1
Jara, A.J.2
Gómez-Skarmeta, A.F.3
-
57
-
-
44949237454
-
Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). Internet engineering task force
-
Fremont, CA, USA, RFC
-
S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Möller, "Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). Internet engineering task force," IETF, Fremont, CA, USA, RFC 4492, 2006.
-
(2006)
IETF
, vol.4492
-
-
Blake-Wilson, S.1
Bolyard, N.2
Gupta, V.3
Hawk, C.4
Möller, B.5
-
58
-
-
84928029862
-
Actors in the ACE architecture
-
Fremont, CA, USA Draft-Gerdes-Ace-Actors-01
-
S. Gerdes, "Actors in the ACE architecture," IETF, Fremont, CA, USA, 2014, Draft-Gerdes-Ace-Actors-01.
-
(2014)
IETF
-
-
Gerdes, S.1
-
59
-
-
84928029861
-
-
OASIS Committee Specification 02, Burlington, MA, USA
-
E. Rissanen, "XACML v3.0 multiple decision profile version 1.0," OASIS Committee Specification 02, Burlington, MA, USA, 2014.
-
(2014)
XACML v3.0 Multiple Decision Profile Version 1.0
-
-
Rissanen, E.1
-
60
-
-
67650675833
-
The EAP-TLS authentication protocol
-
Fremont, CA, USA, RFC
-
D. Simon, B. Aboba, and R. Hurst, "The EAP-TLS authentication protocol," IETF, Fremont, CA, USA, RFC 5216, 2008.
-
(2008)
IETF
, vol.5216
-
-
Simon, D.1
Aboba, B.2
Hurst, R.3
-
62
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
New York, NY, USA: Springer- Verlag
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," in Wireless Sensor Networks. New York, NY, USA: Springer-Verlag, 2008, pp. 305-320.
-
(2008)
Wireless Sensor Networks
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
63
-
-
84930759048
-
Ace use cases
-
Fremont, CA, USA Draft-Seitz-Ace-Usecases-01
-
L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "ACE use cases," IETF, Fremont, CA, USA, 2014, Draft-Seitz-Ace-Usecases-01.
-
(2014)
IETF
-
-
Seitz, L.1
Gerdes, S.2
Selander, G.3
Mani, M.4
Kumar, S.5
|