-
1
-
-
84944138953
-
-
TTU Internet Reports 2005: The Internet of Things
-
International Telecommunication Union UTT. TTU Internet Reports 2005: The Internet of Things, 2005.
-
(2005)
-
-
-
2
-
-
78149349578
-
A study of information security for M2M of IOT
-
The 3rd International Conference on Advanced Computer Theory and Engineering, Chengdu
-
Du J, Chao SW. A study of information security for M2M of IOT. The 3rd International Conference on Advanced Computer Theory and Engineering 2010, Chengdu; 576-579.
-
(2010)
, pp. 576-579
-
-
Du, J.1
Chao, S.W.2
-
4
-
-
77958601933
-
-
The Sixth International Conference on Networked Computing and Advanced Information Management, Seoul;
-
Nguyen TD, Aymen AS, Huh EN. A dynamic ID-based authentication scheme. The Sixth International Conference on Networked Computing and Advanced Information Management 2010, Seoul; 248-253.
-
(2010)
A dynamic ID-based authentication scheme
, pp. 248-253
-
-
Nguyen, T.D.1
Aymen, A.S.2
Huh, E.N.3
-
5
-
-
38049042285
-
The efficient security architecture for authentication and authorization in the home network
-
The Third International Conference on Natural Computation, Haikou;
-
Lee HK, Lee JY, Han JW. The efficient security architecture for authentication and authorization in the home network. The Third International Conference on Natural Computation 2007, Haikou; 713-717.
-
(2007)
, pp. 713-717
-
-
Lee, H.K.1
Lee, J.Y.2
Han, J.W.3
-
6
-
-
84944045366
-
Home network modelling and home network user authentication mechanism using biometric information
-
IEEE Tenth International Symposium on Consumer Electronics, St. Petersburg;
-
Lee YK, Ju H, Kim DW, et al. Home network modelling and home network user authentication mechanism using biometric information. IEEE Tenth International Symposium on Consumer Electronics 2006, St. Petersburg; 1-5.
-
(2006)
, pp. 1-5
-
-
Lee, Y.K.1
Ju, H.2
Kim, D.W.3
-
8
-
-
51949106988
-
A simple and secure authentication and key establishment protocol
-
The First International Conference on Emerging Trends in Engineering and Technology, Maharashtra
-
Das ML, Narasimhan VL. A simple and secure authentication and key establishment protocol. The First International Conference on Emerging Trends in Engineering and Technology 2008, Maharashtra; 844-849.
-
(2008)
, pp. 844-849
-
-
Das, M.L.1
Narasimhan, V.L.2
-
9
-
-
84876014299
-
A hash-based EAP authentication protocol (in Chinese)
-
Chen FQ, Yao GX. A hash-based EAP authentication protocol (in Chinese). Computer Systems and Applications 2010; 19(6): 74-77.
-
(2010)
Computer Systems and Applications
, vol.19
, Issue.6
, pp. 74-77
-
-
Chen, F.Q.1
Yao, G.X.2
-
10
-
-
84944047556
-
Research on fast AES algorithm based on small-scale FPGA (in Chinese)
-
Leng W, Cao JC, Wang AG. Research on fast AES algorithm based on small-scale FPGA (in Chinese). Computer Engineering 2010; 36(7): 159-161.
-
(2010)
Computer Engineering
, vol.36
, Issue.7
, pp. 159-161
-
-
Leng, W.1
Cao, J.C.2
Wang, A.G.3
-
12
-
-
79952065574
-
Industrial sensor network security architecture
-
The Fourth International Conference on Emerging Security Information, Systems and Technologies, Venice
-
Falk R, Hof HJ. Industrial sensor network security architecture. The Fourth International Conference on Emerging Security Information, Systems and Technologies 2010, Venice; 97-102.
-
(2010)
, pp. 97-102
-
-
Falk, R.1
Hof, H.J.2
|