-
4
-
-
84901263621
-
Scenarios for 5G mobile and wireless communications: the vision of the METIS project
-
Osseiran A, Boccardi F, Braun V, et al. Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine 2014; 52(5):26–35.
-
(2014)
IEEE Communications Magazine
, vol.52
, Issue.5
, pp. 26-35
-
-
Osseiran, A.1
Boccardi, F.2
Braun, V.3
-
6
-
-
79953041521
-
Remote patient monitoring within a future 5G infrastructure
-
Oleshchuk V, Fensli R. Remote patient monitoring within a future 5G infrastructure. Wireless Personal Communications 2011; 57(3):431–439.
-
(2011)
Wireless Personal Communications
, vol.57
, Issue.3
, pp. 431-439
-
-
Oleshchuk, V.1
Fensli, R.2
-
11
-
-
79951833159
-
Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
-
Nguyen LH, Roscoe AW. Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. Journal of Computer Security 2011; 19(1):139–201.
-
(2011)
Journal of Computer Security
, vol.19
, Issue.1
, pp. 139-201
-
-
Nguyen, L.H.1
Roscoe, A.W.2
-
13
-
-
84876192814
-
Human interactive secure key and identity exchange protocols in body sensor networks
-
Huang X, Chen B, Markham A, et al. Human interactive secure key and identity exchange protocols in body sensor networks. IET Information Security 2013; 7(1):30–38.
-
(2013)
IET Information Security
, vol.7
, Issue.1
, pp. 30-38
-
-
Huang, X.1
Chen, B.2
Markham, A.3
-
15
-
-
84911881747
-
Secure communication with RFID tags in the Internet of Things
-
Dominikus S, Kraxberger S. Secure communication with RFID tags in the Internet of Things. Security and Communication Networks 2014; 7(12):2639–2653.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.12
, pp. 2639-2653
-
-
Dominikus, S.1
Kraxberger, S.2
-
16
-
-
84911865485
-
Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN
-
Raza S, Duquennoy S, Höglund J, et al. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN. Security and Communication Networks 2014; 7(12):2654–2668.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.12
, pp. 2654-2668
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
-
17
-
-
84911867979
-
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol
-
Rekleitis E, Rizomiliotis P, Gritzalis S. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Security and Communication Networks 2014; 7(12):2669–2683.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.12
, pp. 2669-2683
-
-
Rekleitis, E.1
Rizomiliotis, P.2
Gritzalis, S.3
-
18
-
-
84921717917
-
A security authentication scheme in machine-to-machine home network service
-
Sun X, Men S, Zhao C, et al. A security authentication scheme in machine-to-machine home network service. Security and Communication Networks 2012.
-
(2012)
Security and Communication Networks
-
-
Sun, X.1
Men, S.2
Zhao, C.3
-
19
-
-
84992733144
-
A privacy enhanced device access protocol for an IoT context
-
Køien GM. A privacy enhanced device access protocol for an IoT context. Security and Communication Networks 2013.
-
(2013)
Security and Communication Networks
-
-
Køien, G.M.1
-
21
-
-
48749117730
-
Context-aware wireless sensor networks for assisted living and residential monitoring
-
Wood A, Stankovic JA, Virone G, et al. Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Network 2008; 22(4):26–33.
-
(2008)
IEEE Network
, vol.22
, Issue.4
, pp. 26-33
-
-
Wood, A.1
Stankovic, J.A.2
Virone, G.3
-
23
-
-
84876172823
-
-
Internet Technology and Secured Transactions, 2012 International Conference for IEEE
-
Huang X, Fu R, Chen B, et al. User interactive Internet of Things privacy preserved access control. Internet Technology and Secured Transactions, 2012 International Conference for IEEE, 2012; 597–602.
-
(2012)
User interactive Internet of Things privacy preserved access control
, pp. 597-602
-
-
Huang, X.1
Fu, R.2
Chen, B.3
-
24
-
-
84884730951
-
User-centric secure integration of personal RFID tags and sensor networks
-
Najera P, Roman R, Lopez J. User-centric secure integration of personal RFID tags and sensor networks. Security and Communication Networks 2013; 6(10):1177–1197.
-
(2013)
Security and Communication Networks
, vol.6
, Issue.10
, pp. 1177-1197
-
-
Najera, P.1
Roman, R.2
Lopez, J.3
-
25
-
-
84911905537
-
Context-aware usage control for web of things
-
Bai G, Yan L, Gu L, et al. Context-aware usage control for web of things. Security and Communication Networks 2014; 7(12):2696–2712.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.12
, pp. 2696-2712
-
-
Bai, G.1
Yan, L.2
Gu, L.3
-
26
-
-
84904686666
-
Pacemaker hack can deliver deadly 830-volt jolt
-
Kirk J. Pacemaker hack can deliver deadly 830-volt jolt. Computerworld 2012; 17.
-
(2012)
Computerworld
, vol.17
-
-
Kirk, J.1
-
28
-
-
24644483295
-
Exploiting empirical engagement in authentication protocol design
-
In, Springer, Boppard, Germany
-
Creese S, Goldsmith M, Harrison R, et al. Exploiting empirical engagement in authentication protocol design. In Security in Pervasive Computing. Springer: Boppard, Germany, 2005; 119–133.
-
(2005)
Security in Pervasive Computing
, pp. 119-133
-
-
Creese, S.1
Goldsmith, M.2
Harrison, R.3
-
32
-
-
84901244508
-
-
The Internet Engineering Task Force–IETF, Orlando
-
Shelby Z, Hartke K, Bormann C, et al. Constrained Application Protocol (CoAP), draft-ietf-core-coap-13. The Internet Engineering Task Force–IETF: Orlando, 2012.
-
(2012)
Constrained Application Protocol (CoAP), draft-ietf-core-coap-13
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
|