-
1
-
-
84899008089
-
Security analysis of the constrained application protocol in the internet of things
-
Alghamdi, T., Lasebae, A., and Aiash, M. (2013). Security Analysis of the Constrained Application Protocol in the Internet of Things. In Second International Conference on Future Generation Communication Technology, pages 163-168.
-
(2013)
Second International Conference on Future Generation Communication Technology
, pp. 163-168
-
-
Alghamdi, T.1
Lasebae, A.2
Aiash, M.3
-
3
-
-
84938672829
-
Security for the internet of things: A survey of existing protocols and open research issues
-
Granjal, J., Monteiro, E., and Sa Silva, J. (2015). Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Communications Surveys Tutorials, 17(3):1294-1312.
-
(2015)
IEEE Communications Surveys Tutorials
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Sa Silva, J.3
-
4
-
-
84880621938
-
A capability-based security approach to manage access control in the internet of things
-
Gusmeroli, S., Piccione, S., and Rotondi, D. (2013). A Capability-based Security Approach to Manage Access Control in the Internet of Things. Mathematical and Computer Modelling, 58:1189-1205.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, pp. 1189-1205
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
5
-
-
84905732299
-
A soft computing based location-aware access control for smart buildings
-
Hernández, J. L., Moreno, M. V., and Jara, A. J., and Skarmeta, A. F. (2014). A Soft Computing Based Location-aware Access Control for Smart Buildings. Soft Computing, 18(9):1659-1674.
-
(2014)
Soft Computing
, vol.18
, Issue.9
, pp. 1659-1674
-
-
Hernández, J.L.1
Moreno, M.V.2
Jara, A.J.3
Skarmeta, A.F.4
-
6
-
-
84921628525
-
DCapBAC: Embedding authorization logic into smart things through ECC optimizations
-
Hernández-Ramos, J. L., Jara, A. J., Marín, L., and Gómez, A. F. S. (2014). DCapBAC: Embedding Authorization Logic into Smart Things through ECC Optimizations. International Journal of Computer Mathematics, 0:1-22.
-
(2014)
International Journal of Computer Mathematics
, pp. 1-22
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Marín, L.3
Gómez, A.F.S.4
-
7
-
-
84886928358
-
Distributed capability-based access control for the internet of things
-
Hernández-Ramos, J. L., Jara, A. J., Marín, L., and Skarmeta, A. F. (2013). Distributed Capability-based Access Control for the Internet of Things. Journal of Internet Services and Information Security, 3:1-16.
-
(2013)
Journal of Internet Services and Information Security
, vol.3
, pp. 1-16
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Marín, L.3
Skarmeta, A.F.4
-
8
-
-
84861982926
-
Compression format for IPv6 datagrams over IEEE 802.15.4-based networks
-
Hui, J. W. and Thubert, P. (2011). Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks. RFC 6282.
-
(2011)
RFC 6282
-
-
Hui, J.W.1
Thubert, P.2
-
9
-
-
84890559966
-
The routing protocol for low-power and lossy networks (RPL) option for carrying RPL information in data-plane datagrams
-
Hui, J. W. and Vasseur, J. (2012). The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. RFC 6553.
-
(2012)
RFC 6553
-
-
Hui, J.W.1
Vasseur, J.2
-
10
-
-
84879662694
-
Identity driven capability based access control (ICAC) scheme for the internet of things
-
Mahalle, P., Anggorojati, B., Prasad, N., and Prasad, R. (2012a). Identity Driven Capability based Access Control (ICAC) Scheme for the Internet of Things. In 2012 IEEE International Conference on Advanced Networks and Telecommunications Systems, pages 49-54.
-
(2012)
2012 IEEE International Conference on Advanced Networks and Telecommunications Systems
, pp. 49-54
-
-
Mahalle, P.1
Anggorojati, B.2
Prasad, N.3
Prasad, R.4
-
11
-
-
84873426135
-
Identity establishment and capability based access control (IECAC) scheme for internet of things
-
Mahalle, P., Anggorojati, B., Prasad, N., and Prasad, R. (2012b). Identity Establishment and Capability based Access Control (IECAC) Scheme for Internet of Things. In 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), pages 187-191.
-
(2012)
15th International Symposium on Wireless Personal Multimedia Communications (WPMC)
, pp. 187-191
-
-
Mahalle, P.1
Anggorojati, B.2
Prasad, N.3
Prasad, R.4
-
12
-
-
46449128945
-
Transmission of IPv6 packets over IEEE 802.15.4 networks
-
Montenegro, G., Kushalnagar, N., Hui, J. W., and Culler, D. E. (2007). Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944.
-
(2007)
RFC 4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.W.3
Culler, D.E.4
-
13
-
-
84930763799
-
Survey on secure communication protocols for the internet of things
-
Nguyen, K. T., Laurent, M., and Oualha, N. (2015). Survey on Secure Communication Protocols for the Internet of Things. Ad Hoc Networks, 32:17-31.
-
(2015)
Ad Hoc Networks
, vol.32
, pp. 17-31
-
-
Nguyen, K.T.1
Laurent, M.2
Oualha, N.3
-
14
-
-
84949926376
-
An authentication and access control framework for CoAP-based internet of things
-
Pereira, P., Eliasson, J., and Delsing, J. (2014). An Authentication and Access Control Framework for CoAP-based Internet of Things. In 40th Annual Conference of the IEEE Industrial Electronics Society, pages 5293-5299.
-
(2014)
40th Annual Conference of the IEEE Industrial Electronics Society
, pp. 5293-5299
-
-
Pereira, P.1
Eliasson, J.2
Delsing, J.3
-
15
-
-
84883120784
-
Datagram transport layer security version 1.2
-
Rescorla, E. and Modadugu, N. (2012). Datagram Transport Layer Security Version 1.2. RFC 6347.
-
(2012)
RFC 6347
-
-
Rescorla, E.1
Modadugu, N.2
-
16
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R., Zhou, J., and Lopez, J. (2013). On the Features and Challenges of Security and Privacy in Distributed Internet of Things. Computer Networks, 57(10):2266-2279.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
18
-
-
84883665974
-
Authorization framework for the internet-of-things
-
Seitz, L., Selander, G., and Gehrmann, C. (2013). Authorization Framework for the Internet-of-Things. In 14th IEEE International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks, pages 1-6.
-
(2013)
14th IEEE International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
-
19
-
-
84966344230
-
The constrained application protocol (CoAP)
-
Shelby, Z., Hartke, K., and Bormann, C. (2014). The Constrained Application Protocol (CoAP). RFC 7252.
-
(2014)
RFC 7252
-
-
Shelby, Z.1
Hartke, K.2
Bormann, C.3
-
20
-
-
84871266331
-
RPL: Ipv6 routing protocol for low-power and lossy networks
-
Winter, T., Thubert, P., Brandt, A., Hui, J. W., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., and Alexander, R. K. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550.
-
(2012)
RFC 6550
-
-
Winter, T.1
Thubert, P.2
Brandt, A.3
Hui, J.W.4
Kelsey, R.5
Levis, P.6
Pister, K.7
Struik, R.8
Vasseur, J.9
Alexander, R.K.10
|