-
1
-
-
77956884065
-
-
Springer, Berlin, Germany
-
D.Giusto, A. Iera,G.Morabito, and L.Atzori, Eds., The Internet ofThings, Springer, Berlin, Germany, 2010.
-
(2010)
The Internet OfThings
-
-
Giusto, D.1
Iera, A.2
Morabito, G.3
Atzori, L.4
-
2
-
-
84870773703
-
-
Software Engineering Institute
-
Software Engineering Institute, "Cyber-Physical Systems," http://www.sei.cmu.edu/cyber-physical/.
-
Cyber-Physical Systems
-
-
-
3
-
-
33646771783
-
-
International Telecommunication Union ITU Report
-
International Telecommunication Union, "The internet of things," ITU Report, 2005.
-
(2005)
The Internet of Things
-
-
-
4
-
-
77956877124
-
The internet ofthings: A survey
-
L. Atzori, A. Iera, and G.Morabito, "The Internet ofThings: a survey," ComputerNetworks, vol. 54,no. 15,pp. 2787-2805, 2010.
-
(2010)
ComputerNetworks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
75449097421
-
The internet of things: Here now and coming soon
-
G. Mulligan, "The internet of things: here now and coming soon," IEEE Internet Computing, vol. 14, no. 1, pp. 35-36, 2010.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.1
, pp. 35-36
-
-
Mulligan, G.1
-
6
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
R. H. Weber, "Internet of Things-new security and privacy challenges," Computer Law and Security Review, vol. 26, no. 1, pp. 23-30, 2010.
-
(2010)
Computer Law and Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
7
-
-
80052680150
-
An overview of privacy and security issues in the internet of things
-
Springer, New York, NY, USA
-
C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the Internet of things," in The Internet of Things: Proceedings of the 20th Tyrrhenian Workshop on Digital Communications, pp. 389-395, Springer, New York, NY, USA, 2010.
-
(2010)
The Internet of Things: Proceedings of the 20th Tyrrhenian Workshop on Digital Communications
, pp. 389-395
-
-
Medaglia, C.M.1
Serbanati, A.2
-
8
-
-
84928029704
-
Security and privacy challenges in the internet of things
-
C. P. Mayer, "Security and privacy challenges in the internet of things," Electronic Communications of the EASST, vol. 17, 2009.
-
(2009)
Electronic Communications of the EASST
, vol.17
-
-
Mayer, C.P.1
-
9
-
-
80052680150
-
An overview of privacy and security issues in the internet of things
-
Ponza, Italy
-
C. M. Medaglia and A. Serbanati, "An overview of privacy and security issues in the Internet of things," in Proceedings of the 20th TyrrhenianWorkshop onDigital Communications, pp. 389-395, Ponza, Italy, 2010.
-
(2010)
Proceedings of the 20th TyrrhenianWorkshop OnDigital Communications
, pp. 389-395
-
-
Medaglia, C.M.1
Serbanati, A.2
-
10
-
-
70350787080
-
Self managed security cell, a securitymodel for the internet of things and services
-
Athens, Greece June
-
P. De Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair, "Self managed security cell, a securitymodel for the internet of things and services," in Proceedings of the 1st International Conference on Advances in Future Internet (AFIN '09), pp. 47-52, Athens, Greece, June 2009.
-
(2009)
Proceedings of the 1st International Conference on Advances in Future Internet (AFin '09)
, pp. 47-52
-
-
De Leusse, P.1
Periorellis, P.2
Dimitrakos, T.3
Nair, S.K.4
-
11
-
-
84941619723
-
Privacy and security in the exploitation of internet of things
-
B. Shen and Y. Liu, "Privacy and security in the exploitation of internet of things," Journal of Dialectics of Nature, vol. 33, no. 6, pp. 77-83, 2011.
-
(2011)
Journal of Dialectics of Nature
, vol.33
, Issue.6
, pp. 77-83
-
-
Shen, B.1
Liu, Y.2
-
12
-
-
77949549396
-
Public security versus privacy in technology law: A balancing act?"
-
K. Aquilina, "Public security versus privacy in technology law: a balancing act?" Computer Law & Security Review, vol. 26, no. 2, pp. 130-143, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.2
, pp. 130-143
-
-
Aquilina, K.1
-
13
-
-
84869023246
-
Secure localization in wireless sensor networks with mobile beacons
-
Article ID 732381
-
T. Zhang, J. He, and H. Yu, "Secure localization in wireless sensor networks with mobile beacons," International Journal of Distributed Sensor Networks, vol. 2012, Article ID 732381, 11 pages, 2012.
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
-
-
Zhang, T.1
He, J.2
Yu, H.3
-
14
-
-
84995379762
-
Information security & privacy classification(ispc)
-
Office of the Chief Information & Privacy Officer October
-
Office of the Chief Information & Privacy Officer, "Information security & privacy classification(ISPC)," in Proceedings of the Sharing New Perspective: Access& Privacy Workshop, October 2008.
-
(2008)
Proceedings of the Sharing New Perspective: Access& Privacy Workshop
-
-
-
16
-
-
19944410665
-
The case for privacy
-
J. M.Corby, "The case for privacy," Information Systems Security, vol. 11, no. 2, pp. 9-14, 2002.
-
(2002)
Information Systems Security
, vol.11
, Issue.2
, pp. 9-14
-
-
Corby, J.M.1
-
19
-
-
84946693292
-
Privacy information security classification study in internet of things
-
X. F. Lu, Q. Li, Z.Qu, and P.Hui, "Privacy information security classification study in internet of things," in Proceedings of the International Conference on Identification, Information and Knowledge in the Internet ofThing, 2014.
-
(2014)
Proceedings of the International Conference on Identification, Information and Knowledge in the Internet OfThing
-
-
Lu, X.F.1
Li, Q.2
Qu, Z.3
Hui, P.4
-
20
-
-
84928035920
-
-
[Ph.D. thesis] China University of Political Science and Law, Changping, China
-
Z. Li,The lawprotection for the privacy right [Ph.D. thesis],China University of Political Science and Law, Changping, China, 2006.
-
(2006)
The Lawprotection for the Privacy Right
-
-
Li, Z.1
|