-
1
-
-
84900823317
-
QoS-aware scheduling of services-oriented internet of things
-
May
-
Ling Li et al., "QoS-Aware Scheduling of Services-Oriented Internet of Things, " Industrial Informatics, IEEE Transactions, vol. lO, no. 2, pp. 1497, 1505, May 2014 doi: 10. 11 09/TII. 20 14. 2306782
-
(2014)
Industrial Informatics, IEEE Transactions
, vol.10
, Issue.2
, pp. 1497-1505
-
-
Ling, L.1
-
2
-
-
84941979944
-
-
RFID, (2014), Available: Atlasrfid. comljovix-educationlauto-idbasics/ acti ve-rfid-vs-passi ve-rfid
-
RFID, (2014), Available: Atlasrfid. comljovix-educationlauto-idbasics/ acti ve-rfid-vs-passi ve-rfid.
-
-
-
-
3
-
-
0037086890
-
Wireless sensor networks: A survey
-
LF. Akyildiz, W. Su et al., in "Wireless sensor networks: A survey", Computer Networks 38 (4) (2002) 393-422
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, L.F.1
Su, W.2
-
4
-
-
84941979945
-
-
IEEE 802. 15, Available: Ieee802. org/15
-
IEEE 802. 15, Available: Ieee802. org/15
-
-
-
-
6
-
-
77955797758
-
A semantic analysis for internet of things
-
11-12 May
-
Yinghui Huang, Guanyu Li, "A Semantic Analysis for Internet of Things, " Intelligent Computation Technology and Automation (lCICTA), 2010 International Conference on, vol. l, no., pp. 336, 339, 11-12 May 2010 doi: 1O. 1109/ICICTA. 20I0. 73
-
(2010)
Intelligent Computation Technology and Automation (LCICTA), 2010 International Conference on
, vol.1
, pp. 336-339
-
-
Huang, Y.1
Li, G.2
-
7
-
-
84901329464
-
Rest-based sensor networks with OData
-
2-4 April
-
Matthias Thoma et al., "Rest-based sensor networks with OData, " Wireless On-demand Network Systems and Services (WONS), 2014 lIth Annual Conference on, vol., no., pp. 33, 40, 2-4 April 2014 doi: 1O. 1109/WONS. 2014. 6814719
-
(2014)
Wireless On-demand Network Systems and Services (WONS), 2014 LIth Annual Conference on
, pp. 33-40
-
-
Thoma, M.1
-
8
-
-
79956345109
-
Browsing the internet of things with sentient visors
-
May
-
Garcia-Macias et al., "Browsing the Internet of Things with Sentient Visors, " Computer, vo1. 44, no. 5, ppA6, 52, May 2011 doi: 10. 1109/MC. 2011. 128
-
(2011)
Computer
, vol.44
, Issue.5
, pp. A6-52
-
-
Garcia-Macias1
-
9
-
-
78751700704
-
A real-time search engine for the Web of Things
-
Nov. 29 201O-Dec. I 2010
-
Ostermaier, B et al., "A real-time search engine for the Web of Things, " Internet of Things (lOT), 2010, vol., no., pp. l, 8, Nov. 29 201O-Dec. I 2010 doi: 10. 1109/IOT. 2010. 5678450
-
(2010)
Internet of Things (LOT)
, pp. 1-8
-
-
Ostermaier, B.1
-
11
-
-
77956877124
-
The Internet of Things: A survey
-
28 October
-
Luigi Atzoria, Antonio Ierab, Giacomo Morabito, "The Internet of Things: A survey", Elsevier Volume 54, Issue 15, 28 October 2010
-
(2010)
Elsevier
, vol.54
, Issue.15
-
-
Atzoria, L.1
Ierab, A.2
Morabito, G.3
-
12
-
-
84893462100
-
Construction and Strategies in loT Security System
-
20-23 Aug.
-
Lianshan Yan et al., "Construction and Strategies in loT Security System", Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, vol., no., pp. 1129, 1132, 20-23 Aug. 2013 doi: 1O. 1109/GreenCom-iThingsCPSCom. 20 13. 195
-
(2013)
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (IThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing
, pp. 1129-1132
-
-
Yan, L.1
-
13
-
-
84871365378
-
A group key distribution scheme for wireless sensor networks in the internet of things scenario
-
Article ID
-
Hong Yu et al., "A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario", International Journal of Distributed Sensor Networks Volume 2012, Article ID 813594, 12 pages doi: Dx. doi. orgll0. 115512012/813594
-
International Journal of Distributed Sensor Networks
, vol.2012
-
-
Yu, H.1
-
14
-
-
84941963822
-
Research on security issues of the internet of things
-
Chen Qiang et al., "Research on Security Issues of the Internet of Things", International Journal of Future Generation Communication and Networking Vo1. 6, No. 6 (2013), pp. l-1O doi: Dx. doi. orgll 0. 14257/ijfgcn. 20 13. 6. 6. 0 1
-
(2013)
International Journal of Future Generation Communication and Networking
, vol.6
, Issue.6
, pp. 1-10
-
-
Qiang, C.1
-
15
-
-
84925380945
-
Research on the smart wireless sensor perception system and its application based on Internet of Things
-
2014 (Dec 2014)
-
Zhang Yongheng, Zhang Feng, "Research on the smart wireless sensor perception system and its application based on Internet of Things", computer modelling & new technologies 2014 18(1) 44-51 2014 (Dec 2014) Available: Tsi. lv
-
(2014)
Computer Modelling & New Technologies
, vol.18
, Issue.1
, pp. 44-51
-
-
Yongheng, Z.1
Feng, Z.2
-
16
-
-
84911876362
-
Smartphone assisted security pairings for the Internet of Things
-
11-14 10. 11 09NIT AE. 20 14. 6934398 May
-
Suomalainen, J, "Smartphone assisted security pairings for the Internet of Things, " Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on, vol., no., pp. I, 5, 11-14 10. 11 09NIT AE. 20 14. 6934398 May 2014 doi
-
(2014)
Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on
, pp. 1-5
-
-
Suomalainen, J.1
-
17
-
-
84904472157
-
A groupbased security protocol for machine type communications in LTE-advanced
-
April 27 2014-May 2
-
Daesung Choi; Sungdae Hong; Hyoung-Kee Choi, "A groupbased security protocol for Machine Type Communications in LTE-Advanced, " Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, vol., no., pp. 161, 162, April 27 2014-May 2 2014 doi: 10. 1109/INFCOMW. 2014. 6849205
-
(2014)
Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on
, pp. 161-162
-
-
Choi, D.1
Hong, S.2
Choi, H.3
-
20
-
-
79961063540
-
Proximate: Proximity-based secure pairing using ambient wireless signals
-
ACM New York, NY, USA
-
S Mathur, R Miller, A Varshavsky, W Trappe, N Mandayam, "Proximate: Proximity-based secure pairing using ambient wireless signals", MobiSys 'II Proceedings of the 9th international conference on Mobile systems, applications, and services Pages 211-224 ACM New York, NY, USA 2011 doi: 10. 1145/1999995. 2000016
-
(2011)
MobiSys 'II Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 211-224
-
-
Mathur, S.1
Miller, R.2
Varshavsky, A.3
Trappe, W.4
Mandayam, N.5
-
22
-
-
33745156127
-
Secure communications over insecure channels based on short authenticated strings
-
S. Vaudenay, "Secure communications over insecure channels based on short authenticated strings", Advances in Cryptology-CRYPTO 2005 Lecture Notes in Computer Science Volume 3621, 2005, pp 309-326 doi: Dx. doi. orgIl0. 10071l153521819
-
(2005)
Advances in Cryptology-CRYPTO 2005 Lecture Notes in Computer Science
, vol.3621
, pp. 309-326
-
-
Vaudenay, S.1
-
23
-
-
61849184822
-
Using audio in secure device pairing
-
February
-
Michael T. Goodrich et al. "Using audio in secure device pairing" International Journal of Security and Networks archive Volume 4 Issue 1/2, February 2009 Pages 57-68 doi: I 0. 1504/IJSN. 2009. 023426.
-
(2009)
International Journal of Security and Networks Archive
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Michael, T.G.1
-
24
-
-
11244316710
-
TAP-practical security protocols for wireless personal devices
-
VolA, 5-8 Sept.
-
A. Lakshminarayanan, "TAP-practical security protocols for wireless personal devices, " Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium on, volA, no., pp. 2884, 2888 VolA, 5-8 Sept. 2004 doi: 1O. 1109/PIMRC. 2004. 1368847
-
(2004)
Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE International Symposium on
, vol.A
, pp. 2884-2888
-
-
Lakshminarayanan, A.1
-
25
-
-
84883730840
-
Batch-based group key management with shared key derivation in the Internet of Things
-
1-5 July
-
Veltri L et al., "Batch-based group key management with shared key derivation in the Internet of Things, " Wireless Communications and Mobile Computing Conference (lWCMC), 2013 9th International, vol., no., pp. 1688, 1693, 1-5 July 2013 doi: 10. 11 09/IWCMC. 20 13. 658381 0
-
(2013)
Wireless Communications and Mobile Computing Conference (LWCMC), 2013 9th International
, pp. 1688-1693
-
-
Veltri, L.1
-
26
-
-
77958575831
-
The analysis of the security strategy of embedded mobile database
-
9-11 July
-
Huaixiang Wang et al., "The analysis of the security strategy of embedded mobile database, " Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on vol. 6, no., ppA76, 478, 9-11 July 2010 doi: I 0. 1109/ICCSIT. 201 0. 5564079
-
(2010)
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
, vol.6
, pp. A76-478
-
-
Wang, H.1
-
27
-
-
84921461758
-
Securing smart home: Technologies, security challenges, and security requirements
-
29-31 Oct.
-
Changmin Lee et etl., "Securing smart home: Technologies, security challenges, and security requirements, " Communications and Network Security (CNS), 2014 IEEE Conference on, vol., no., pp. 67, n, 29-31 Oct. 2014 doi: 10. 1109/CNS. 2014. 6997467
-
(2014)
Communications and Network Security (CNS), 2014 IEEE Conference on
, pp. 67
-
-
Lee Et Etl, C.1
-
28
-
-
72949104155
-
A survey on jamming attacks and countermeasures in wsns
-
A. Mpitziopoulos et al., "A survey on jamming attacks and countermeasures in wsns" Communications Surveys & Tutorials, IEEE, vol. 11, no. 4, pp. 42-56, 2009
-
(2009)
Communications Surveys & Tutorials, IEEE
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
|