-
1
-
-
84923887174
-
Enabling the internet of things
-
Jan.
-
R. Want, B. Schilit, S. Jenson, "Enabling the internet of things," IEEE Computer, vol. 48, no. 1, pp. 28-35, Jan. 2015.
-
(2015)
IEEE Computer
, vol.48
, Issue.1
, pp. 28-35
-
-
Want, R.1
Schilit, B.2
Jenson, S.3
-
2
-
-
84964738022
-
-
Lazure, Dec. [Online]. Available
-
N. Sandor, "Wind River: Intel's core technology provider or IoT," Lazure, Dec. 2013. [Online]. Available: https://lazure2.wordpress.com/2014/12/10/windriver-intels-core-technology-provider-for-iot/
-
(2013)
Wind River: Intel's Core Technology Provider or IoT
-
-
Sandor, N.1
-
3
-
-
84964745323
-
-
Wind River Alameda, CA [Online]. Available
-
Wind River, "Transforming brownfield to greenfield in the Internet of Thing," Alameda, CA, 2015. [Online]. Available: http://www.windriver.com/whitepapers/brownfield-to-greenfield-iot/2142-Brownfield-and-Greenfield-Damisch-IoT-Article.pdf
-
(2015)
Transforming Brownfield to Greenfield in the Internet of Thing
-
-
-
7
-
-
84872902043
-
A reconfigurable communication gateway for distributed embedded control systems
-
Oct.
-
F. Andren, T. Strasser, A. Zoitl, I. Hegny, "A reconfigurable communication gateway for distributed embedded control systems," in Proc. 38th Annu. Conf. IEEE Ind. Electron. Soc., Oct. 2012, pp. 3720-3726.
-
(2012)
Proc. 38th Annu. Conf. IEEE Ind. Electron. Soc.
, pp. 3720-3726
-
-
Andren, F.1
Strasser, T.2
Zoitl, A.3
Hegny, I.4
-
8
-
-
84964247703
-
-
Univ. Washington, Seattle, WA, USA, Apr. [Online]. Available
-
T. Bonaci et al., "To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robotics," Univ. Washington, Seattle, WA, USA, Apr. 2015. [Online]. Available: http://brl.ee.washington.edu/wp-content/uploads/2014/05/arXiv-April-2015.pdf
-
(2015)
To Make A Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics
-
-
Bonaci, T.1
-
10
-
-
84964738004
-
-
Computer World, Apr. 2 [Online]. Available
-
D. Storm, "Researchers hijack teleoperated surgical robot: Remote surgery hacking threats," Computer World, Apr. 2, 2015. [Online]. Available: http://www. computerworld.com/article/2914741/cybercrime-hacking/researchers-hijackteleoperated-surgical-robot-remote-surgeryhacking-threats.html
-
(2015)
Researchers Hijack Teleoperated Surgical Robot: Remote Surgery Hacking Threats
-
-
Storm, D.1
-
11
-
-
84893261644
-
-
Trend Micro, Irving, TX, USA [Online]. Available
-
K. Wilhoit, "Who's really attacking your ICS equipment?" Trend Micro, Irving, TX, USA, 2013. [Online]. Available: http://www. trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-whosreally-attacking-your-ics-equipment.pdf
-
(2013)
Who's Really Attacking Your ICS Equipment?
-
-
Wilhoit, K.1
-
12
-
-
77951006536
-
-
NSTC Subcommittee on Biometrics Sep. [Online]. Available
-
NSTC Subcommittee on Biometrics, Sep. 2006, Biometrics Frequently Asked Questions. [Online]. Available: http://biometrics.gov/Documents/FAQ.pdf
-
(2006)
Biometrics Frequently Asked Questions
-
-
-
13
-
-
84964751279
-
-
M. Tech Scholar, Nov. [Online]. Available
-
S. Basishtha and S. Boruah, "Biometric authentication techniques," M. Tech Scholar, Nov. 2013. [Online]. Available: http://www. slideshare.net/sububasistha/a-study-onbiometric-authentication-techniques? related=1
-
(2013)
Biometric Authentication Techniques
-
-
Basishtha, S.1
Boruah, S.2
-
15
-
-
84873449398
-
-
NIST Special Publication 800-118 Apr. [Online]. Available
-
K. Scarfone and M. Souppaya, "Guide to enterprise password management," NIST Special Publication 800-118, Apr. 2009. [Online]. Available: http://csrc.nist. gov/publications/drafts/800-118/draft-sp800-118.pdf
-
(2009)
Guide to Enterprise Password Management
-
-
Scarfone, K.1
Souppaya, M.2
-
17
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun.
-
U. Uludag, S. Pankanti, S. Prabhakar, A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
-
(2004)
Proc IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
18
-
-
84964772770
-
-
PBWorks [Online] Available
-
PBWorks, "Biometrics: Advantages and disadvantages of technologies," 2003. [Online]. Available: http://biometrics. pbworks.com/w/page/14811349/Advantages% 20and%20disadvantages%20of% 20technologies
-
(2003)
Biometrics: Advantages and Disadvantages of Technologies
-
-
-
19
-
-
84900525490
-
-
Chaos Computer Club Sep. 21 [Online]. Available
-
Chaos Computer Club, "Chaos computer club breaks Apple TouchID," Sep. 21, 2013. [Online]. Available: http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid
-
(2013)
Chaos Computer Club Breaks Apple TouchID
-
-
-
20
-
-
0036030112
-
Impact of artificial gummy fingers on fingerprint systems
-
Jan. 24-25
-
T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, "Impact of artificial gummy fingers on fingerprint systems," in Proc. SPIE-Int. Soc. Opt. Eng., vol. 4677, Optical Security and Counterfeit Deterrence Techniques IV, Jan. 24-25, 2002, DOI:10.1117/12.462719.
-
(2002)
Proc. SPIE-Int. Soc. Opt. Eng., Optical Security and Counterfeit Deterrence Techniques IV
, vol.4677
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
22
-
-
84856097710
-
-
Black Hat Briefings [Online]. Available
-
N. M. Duc and B. Q. Minh, "Your face is NOT your password," Black Hat Briefings, 2009. [Online]. Available: https://www. blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-notyour-password.pdf
-
(2009)
Your Face Is NOT Your Password
-
-
Duc, N.M.1
Minh, B.Q.2
-
23
-
-
84964734312
-
Face recognition security, even with a 'Blink Test', is easy to trick
-
Mar. 15 [Online]. Available
-
D. Moren, "Face recognition security, even with a 'Blink Test', is easy to trick," Popular Sci., Mar. 15, 2015. [Online]. Available: http://www.popsci.com/its-not-hard-trickfacial-recognition-security
-
(2015)
Popular Sci.
-
-
Moren, D.1
-
24
-
-
70450225439
-
Biometric hash generation and user authentication based on handwriting using secure sketches
-
T. Scheidat, C. Vielhauer, J. Dittmann, "Biometric hash generation and user authentication based on handwriting using secure sketches," in Proc. Int. Symp. Image Signal Process. Anal., 2009, pp. 89-94.
-
(2009)
Proc. Int. Symp. Image Signal Process. Anal.
, pp. 89-94
-
-
Scheidat, T.1
Vielhauer, C.2
Dittmann, J.3
-
25
-
-
84897448940
-
Secure cloud-based biometric authentication utilizing smart devices for electronic transactions
-
[Online]. Available
-
B. L. Tait, "Secure cloud-based biometric authentication utilizing smart devices for electronic transactions," Int. J. Electron. Security Digital Forens., vol. 6, no. 1, 2014. [Online]. Available: http://www. inderscienceonline.com/doi/pdf/10.1504/IJESDF.2014.060170
-
(2014)
Int. J. Electron. Security Digital Forens.
, vol.6
, Issue.1
-
-
Tait, B.L.1
-
26
-
-
67650239548
-
Fake fingers in fingerprint recognition: Glycerin supersedes gelatin
-
C. Barral and A. Tria, "Fake fingers in fingerprint recognition: Glycerin supersedes gelatin," Formal to Practical Security, pp. 57-69, 2008.
-
(2008)
Formal to Practical Security
, pp. 57-69
-
-
Barral, C.1
Tria, A.2
-
27
-
-
84964738014
-
-
The Associated Press HuffPost Green, May 29 [Online]. Available
-
The Associated Press, "California oil spill grows to 9 miles along coast," HuffPost Green, May 29, 2015. [Online]. Available: http://www.huffingtonpost.com/2015/05/20/california-oil-spill-n-7344940.html
-
(2015)
California Oil Spill Grows to 9 Miles Along Coast
-
-
-
29
-
-
84919476322
-
An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks
-
Dec.
-
H. Sedjelmaci, S. M. Senouci, M. A. Abu-Rgheff, "An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks," Internet of Things J., vol. 1, no. 6, pp. 570-577, Dec. 2014.
-
(2014)
Internet of Things J.
, vol.1
, Issue.6
, pp. 570-577
-
-
Sedjelmaci, H.1
Senouci, S.M.2
Abu-Rgheff, M.A.3
-
30
-
-
84888878286
-
Security prognostics: Cyber meets PHM
-
Jun. 24-27
-
S. C. Evans, P. Mishra, W. Yan, B. Bouqata, "Security prognostics: Cyber meets PHM," in Proc. IEEE Conf. Prognostics Health Manage., Jun. 24-27, 2013, DOI: 10.1109/ICPHM.2013.6621448.
-
(2013)
Proc IEEE Conf. Prognostics Health Manage.
-
-
Evans, S.C.1
Mishra, P.2
Yan, W.3
Bouqata, B.4
-
31
-
-
84897140054
-
Design and analysis of a highly user-friendly, secure, privacy-preserving, revocable authentication method
-
Apr.
-
Y. Sui, X. Zou, E. Du, F. Li, "Design and analysis of a highly user-friendly, secure, privacy-preserving, revocable authentication method," IEEE Trans. Comput., vol. 63, no. 4, pp. 902-216, Apr. 2014.
-
(2014)
IEEE Trans. Comput.
, vol.63
, Issue.4
, pp. 902-1216
-
-
Sui, Y.1
Zou, X.2
Du, E.3
Li, F.4
-
33
-
-
79960904737
-
Proposed embedded security framework for Internet of Things (IoT)
-
Feb. 28-Mar. 3
-
S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, "Proposed embedded security framework for Internet of Things (IoT)," in Proc. 2nd Int. Conf. Wireless Commun. Veh. Technol. Inf. Theory Aerosp. Electron. Syst. Technol., Feb. 28-Mar. 3, 2011, DOI: 10.1109/WIRELESSVITAE.2011.5940923.
-
(2011)
Proc. 2nd Int. Conf. Wireless Commun. Veh. Technol. Inf. Theory Aerosp. Electron. Syst. Technol.
-
-
Babar, S.1
Stango, A.2
Prasad, N.3
Sen, J.4
Prasad, R.5
-
34
-
-
84964794577
-
-
Intel Corp. RealSense Santa Clara, CA, USA. [Online]. Available
-
Intel Corp., "RealSense," Santa Clara, CA, USA. [Online]. Available: http://www.intel. com/content/www/us/en/architecture-andtechnology/realsense-overview.html
-
-
-
-
35
-
-
84964699215
-
-
ARM, TrustZone San Jose, CA, USA [Online]. Available
-
ARM, "TrustZone," San Jose, CA, USA, 2015. [Online]. Available: http://www.arm. com/products/processors/technologies/trustzone/index.php
-
(2015)
-
-
-
37
-
-
79952958289
-
Practical eaves dropping and skimming attacks on high-frequency RFID tokens
-
Mar. 14
-
G. P. Hancke, "Practical eaves dropping and skimming attacks on high-frequency RFID tokens," J. Comput. Security, vol. 19, no. 2, pp. 259-288, Mar. 14, 2011.
-
(2011)
J. Comput. Security
, vol.19
, Issue.2
, pp. 259-288
-
-
Hancke, G.P.1
-
38
-
-
84884392684
-
Biovault: Solving the problem of replay in biometrics
-
Poznan, Poland Oct.
-
B. Tait and B. Von Solms, "Biovault: Solving the problem of replay in biometrics," in Proc. 5th IFIP Conf. e-Commerce e-Business e-Government, Poznan, Poland, Oct. 2004, pp. 465-479.
-
(2004)
Proc. 5th IFIP Conf. E-Commerce E-Business E-Government
, pp. 465-479
-
-
Tait, B.1
Von Solms, B.2
-
39
-
-
70350096381
-
Biometrically based electronic signatures for a public networked environment
-
London, U.K Sep. 1-2
-
B. Tait and B. Von Solms, "Biometrically based electronic signatures for a public networked environment," in Proc. 5th Int. Conf. ICGS3, London, U.K., Sep. 1-2, 2009, pp. 174-182.
-
(2009)
Proc. 5th Int. Conf. ICGS3
, pp. 174-182
-
-
Tait, B.1
Von Solms, B.2
-
40
-
-
84945129714
-
A multi-factor security protocol for wireless payment-Secure web authentication using mobile devices
-
Salamanca, Spain, Nov.
-
A. Tiwari, S. Sanyal, A. Abraham, "A multi-factor security protocol for wireless payment-Secure web authentication using mobile devices," in Proc. IADIS Int. Conf. Appl. Comput., Salamanca, Spain, Nov. 2011, pp. 18-20.
-
(2011)
Proc. IADIS Int. Conf. Appl. Comput.
, pp. 18-20
-
-
Tiwari, A.1
Sanyal, S.2
Abraham, A.3
-
44
-
-
84964719919
-
-
Intel Corp [Online]. Available
-
Intel Corp., "The Internet of Things (IoT) starts with Intel inside," 2015. [Online]. Available: http://www.intel.com/content/www/us/en/internet-of-things/overview.html
-
(2015)
The Internet of Things (IoT) Starts with Intel Inside
-
-
-
45
-
-
84964728666
-
-
Intel Corp [Online]. Available
-
Intel Corp., "Internet of Things products and solutions," 2015. [Online]. Available: http://www.intel.com/content/www/us/en/internet-of-things/products-and-solutions.html
-
(2015)
Internet of Things Products and Solutions
-
-
|