-
3
-
-
84866034380
-
The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization
-
L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, 3594-3608, 2012.
-
(2012)
Computer Networks
, vol.56
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
4
-
-
84921509489
-
A federated architecture approach for Internet of Things security
-
M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Euro Med Telco Conference (EMTC), 1-5, 2014.
-
(2014)
Euro Med Telco Conference (EMTC)
, pp. 1-5
-
-
Leo, M.1
Battisti, F.2
Carli, M.3
Neri, A.4
-
5
-
-
85002424663
-
Identity authentication and capability based access control (iacac) for the internet of things
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity authentication and capability based access control (iacac) for the internet of things," J. of Cyber Security and Mobility, vol. 1, 309-348, 2013.
-
(2013)
J. of Cyber Security and Mobility
, vol.1
, pp. 309-348
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
6
-
-
84939161468
-
A critical analysis on the security concerns of internet of things (iot)
-
M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)," Perception, vol. 111, 2015.
-
(2015)
Perception
, vol.111
-
-
Farooq, M.1
Waseem, M.2
Khairi, A.3
Mazhar, S.4
-
7
-
-
80052854156
-
Securing the internet of things
-
R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, 51-58, 2011.
-
(2011)
Computer
, vol.44
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
8
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, 2266-2279, 2013.
-
(2013)
Computer Networks
, vol.57
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
9
-
-
84890345792
-
Application of dynamic variable cipher security certificate in internet of things
-
Q. Wen, X. Dong, and R. Zhang, "Application of dynamic variable cipher security certificate in internet of things," in Int'l Conference on Cloud Computing and Intelligent Systems (CCIS), 1062-1066, 2012.
-
(2012)
Int'l Conference on Cloud Computing and Intelligent Systems (CCIS)
, pp. 1062-1066
-
-
Wen, Q.1
Dong, X.2
Zhang, R.3
-
10
-
-
80052096133
-
A novel mutual authentication scheme for Internet of Things
-
G. Zhao, X. Si, J. Wang, X. Long, and T. Hu, "A novel mutual authentication scheme for Internet of Things," in Int'l Conference on Modelling, Identification and Control (ICMIC), 563-566, 2011.
-
(2011)
Int'l Conference on Modelling, Identification and Control (ICMIC)
, pp. 563-566
-
-
Zhao, G.1
Si, X.2
Wang, J.3
Long, X.4
Hu, T.5
-
11
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
12
-
-
84903851734
-
A lightweight authentication protocol for internet of things
-
J.-Y. Lee, W.-C. Lin, and Y.-H. Huang, "A lightweight authentication protocol for internet of things," in Int'l Symposium on Next-Generation Electronics (ISNE), 1-2, 2014.
-
(2014)
Int'l Symposium on Next-Generation Electronics (ISNE)
, pp. 1-2
-
-
Lee, J.-Y.1
Lin, W.-C.2
Huang, Y.-H.3
-
13
-
-
84901805129
-
An item-level access control framework for inter-system security in the internet of things
-
Y. Xie and D. Wang, "An Item-Level Access Control Framework for Inter-System Security in the Internet of Things," in Applied Mechanics and Materials, 1430-1432, 2014.
-
(2014)
Applied Mechanics and Materials
, pp. 1430-1432
-
-
Xie, Y.1
Wang, D.2
-
14
-
-
84873450504
-
Capabilitybased access control delegation model on the federated iot network
-
B. Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad, "Capabilitybased access control delegation model on the federated IoT network," in Int'l Symposium on Wireless Personal Multimedia Communications (WPMC), 604-608, 2012.
-
(2012)
Int'l Symposium on Wireless Personal Multimedia Communications (WPMC)
, pp. 604-608
-
-
Anggorojati, B.1
Mahalle, P.N.2
Prasad, N.R.3
Prasad, R.4
-
15
-
-
84863204599
-
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
-
M. Castrucci, A. Neri, F. Caldeira, J. Aubert, D. Khadraoui, M. Aubigny, et al., "Design and implementation of a mediation system enabling secure communication among Critical Infrastructures," Int'l Journal of Critical Infrastructure Protection, vol. 5, 86-97, 2012.
-
(2012)
Int'l Journal of Critical Infrastructure Protection
, vol.5
, pp. 86-97
-
-
Castrucci, M.1
Neri, A.2
Caldeira, F.3
Aubert, J.4
Khadraoui, D.5
Aubigny, M.6
-
16
-
-
84917692605
-
Enforcement of security policy rules for the internet of things
-
R. Neisse, G. Steri, and G. Baldini, "Enforcement of security policy rules for the internet of things," in Int'l Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 165-172, 2014.
-
(2014)
Int'l Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 165-172
-
-
Neisse, R.1
Steri, G.2
Baldini, G.3
-
17
-
-
84920267916
-
Uninvited connections: A study of vulnerable devices on the internet of things (iot)
-
M. Patton, E. Gross, R. Chinn, S. Forbis, L. Walker, and H. Chen, "Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT)," in Joint Intelligence and Security Informatics Conference (JISIC), 232-235, 2014.
-
(2014)
Joint Intelligence and Security Informatics Conference (JISIC)
, pp. 232-235
-
-
Patton, M.1
Gross, E.2
Chinn, R.3
Forbis, S.4
Walker, L.5
Chen, H.6
-
18
-
-
84924527318
-
Choices for interaction with things on internet and underlying issues
-
I. Mashal, O. Alsaryrah, T.-Y. Chung, C.-Z. Yang, W.-H. Kuo, and D. P. Agrawal, "Choices for Interaction with Things on Internet and Underlying Issues," Ad Hoc Networks, 2015.
-
(2015)
Ad Hoc Networks
-
-
Mashal, I.1
Alsaryrah, O.2
Chung, T.-Y.3
Yang, C.-Z.4
Kuo, W.-H.5
Agrawal, D.P.6
-
19
-
-
84919372488
-
Security, privacy and trust in Internet of Things: The road ahead
-
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, vol. 76, 146-164, 2015.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.3
Coen-Porisini, A.4
-
20
-
-
84903647209
-
Emerging technologies and research challenges for 5G wireless networks
-
W. H. Chin, Z. Fan, and R. Haines, "Emerging technologies and research challenges for 5G wireless networks," Wireless Communications, vol. 21, 106-112, 2014.
-
(2014)
Wireless Communications
, vol.21
, pp. 106-112
-
-
Chin, W.H.1
Fan, Z.2
Haines, R.3
-
21
-
-
84927731786
-
Authentication handover and privacy protection in 5G hetnets using software-defined networking
-
X. Duan and X. Wang, "Authentication handover and privacy protection in 5G hetnets using software-defined networking," Communications Magazine, vol. 53, 28-35, 2015.
-
(2015)
Communications Magazine
, vol.53
, pp. 28-35
-
-
Duan, X.1
Wang, X.2
|