-
1
-
-
13244258403
-
The connected car
-
C. Evans-Pughe, "The connected car," IEE Review, vol. 51, no. 1, pp. 42-46, 2005
-
(2005)
IEE Review
, vol.51
, Issue.1
, pp. 42-46
-
-
Evans-Pughe, C.1
-
2
-
-
84988272474
-
-
"Fitbit. " [Online]. Available: http://www. fitbit. com/us/company#about
-
-
-
-
3
-
-
84862963093
-
Wireless sensor networks
-
F. L. Lewis, "Wireless sensor networks," Smart environments: technologies, protocols, and applications, pp. 11-46, 2004
-
(2004)
Smart Environments: Technologies, Protocols, and Applications
, pp. 11-46
-
-
Lewis, F.L.1
-
5
-
-
80052854156
-
Securing the internet of things
-
R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, no. 9, pp. 51-58, 2011
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
6
-
-
84988272488
-
Security considerations in the ip-based internet of things
-
September
-
e. a. O. Garcia-Morchon, "Security Considerations in the IP-based Internet of Things," IETF, Internet Draft, September 2013, available at http://tools. ietf. org/html/draft-garcia-core-security-06
-
(2013)
IETF, Internet Draft
-
-
Garcia-Morchon, O.E.A.1
-
7
-
-
84874291090
-
End-to-end security for sleepy smart object networks
-
M. Sethi, J. Arkko, and A. Keranen, "End-to-end security for sleepy smart object networks," in Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on. IEEE, 2012, pp. 964-972
-
(2012)
Local Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference On. IEEE
, pp. 964-972
-
-
Sethi, M.1
Arkko, J.2
Keranen, A.3
-
8
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, "Comparing elliptic curve cryptography and rsa on 8-bit cpus," in Cryptographic Hardware and Embedded Systems-CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds. Springer Berlin Heidelberg, 2004, vol. 3156, pp. 119-132. [Online]. Available: http://dx. doi. org/10. 1007/978-3-540-28632-5 9
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES 2004, Ser. Lecture Notes in Computer Science
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
11
-
-
0028513932
-
Access control: Principle and practice
-
R. S. Sandhu and P. Samarati, "Access control: principle and practice," Communications Magazine, IEEE, vol. 32, no. 9, pp. 40-48, 1994
-
(1994)
Communications Magazine, IEEE
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
12
-
-
77957960367
-
Privacy in the clouds
-
A. Cavoukian, "Privacy in the clouds," Identity in the Information Society, vol. 1, no. 1, pp. 89-108, 2008
-
(2008)
Identity in the Information Society
, vol.1
, Issue.1
, pp. 89-108
-
-
Cavoukian, A.1
-
13
-
-
78650118674
-
The oauth 1. 0 protocol
-
April
-
E. E. Hammer-Lahav, "The OAuth 1. 0 Protocol," IETF, RFC 5849, April 2010, available at http://tools. ietf. org/html/rfc5849
-
(2010)
IETF, RFC 5849
-
-
Hammer-Lahav, E.E.1
-
14
-
-
84895539842
-
The oauth 2. 0 authorization framework
-
October
-
D. H. (ed), "The OAuth 2. 0 Authorization Framework," IETF, RFC 6749, October 2012, available at http://www. rfc-editor. org/rfc/rfc6749. txt
-
(2012)
IETF, RFC 6749
-
-
-
15
-
-
84988300811
-
-
"Mqtt history. " [Online]. Available: http://mqtt. org/wiki/doku. php/ history
-
Mqtt History
-
-
-
17
-
-
84988269111
-
-
https long polling vs. mqtt with ssl, on android. (Visited on 06/04/2013). [Online]. Available
-
Power profiling: Https long polling vs. mqtt with ssl, on android. (Visited on 06/04/2013). [Online]. Available: http://stephendnicholas. com/archives/1217
-
Power Profiling
-
-
-
19
-
-
84988300806
-
-
Arduino
-
Arduino, "Arduino. " [Online]. Available: http://arduino. cc
-
-
-
-
20
-
-
0345565888
-
The many faces of publish/subscribe
-
P. T. Eugster, P. A. Felber, R. Guerraoui, and A.-M. Kermarrec, "The many faces of publish/subscribe," ACM Computing Surveys (CSUR), vol. 35, no. 2, pp. 114-131, 2003
-
(2003)
ACM Computing Surveys (CSUR)
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
23
-
-
80052124769
-
Formal verification of oauth 2. 0 using alloy framework
-
S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh, "Formal verification of oauth 2. 0 using alloy framework," in Communication Systems and Network Technologies (CSNT), 2011 International Conference on. IEEE, 2011, pp. 655-659
-
(2011)
Communication Systems and Network Technologies (CSNT), 2011 International Conference On. IEEE
, pp. 655-659
-
-
Pai, S.1
Sharma, Y.2
Kumar, S.3
Pai, R.M.4
Singh, S.5
-
26
-
-
84876781830
-
Correlation analysis of mqtt loss and delay according to qos level
-
S. Lee, H. Kim, D.-k. Hong, and H. Ju, "Correlation analysis of mqtt loss and delay according to qos level," in Information Networking (ICOIN), 2013 International Conference on. IEEE, 2013, pp. 714-717
-
(2013)
Information Networking (ICOIN), 2013 International Conference On. IEEE
, pp. 714-717
-
-
Lee, S.1
Kim, H.2
Hong, D.-K.3
Ju, H.4
-
28
-
-
79953828506
-
The application of publish/ subscribe messaging to environmental, monitoring, and control systems
-
A. J. Stanford-Clark and G. R. Wightwick, "The application of publish/ subscribe messaging to environmental, monitoring, and control systems," IBM Journal of Research and Development, vol. 54, no. 4, pp. 1-7, 2010
-
(2010)
IBM Journal of Research and Development
, vol.54
, Issue.4
, pp. 1-7
-
-
Stanford-Clark, A.J.1
Wightwick, G.R.2
-
31
-
-
84871939570
-
Introducing the qest broker: Scaling the iot by bridging mqtt and rest
-
M. Collina, G. E. Corazza, and A. Vanelli-Coralli, "Introducing the qest broker: Scaling the iot by bridging mqtt and rest," in Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on. IEEE, 2012, pp. 36-41
-
(2012)
Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium On. IEEE
, pp. 36-41
-
-
Collina, M.1
Corazza, G.E.2
Vanelli-Coralli, A.3
-
32
-
-
84971216170
-
-
"Building facebook messenger. " [Online]. Available: https://www. facebook. com/notes/facebook-engineering/ building-facebook-messenger
-
Building Facebook Messenger
-
-
-
33
-
-
84926448374
-
-
"Facebook login. " [Online]. Available: https://developers. facebook. com/ docs/facebook-login/
-
Facebook Login
-
-
-
34
-
-
84988274016
-
An xmpp messaging infrastructure for a mobile held security identity wallet of personal and private dynamic identity attributes
-
A. B. Augusto and M. E. Correia, "An xmpp messaging infrastructure for a mobile held security identity wallet of personal and private dynamic identity attributes," Proceedings of the XATA, 2011
-
(2011)
Proceedings of the XATA
-
-
Augusto, A.B.1
Correia, M.E.2
|