-
1
-
-
85013849461
-
-
Ashton K (2009) That “Internet of Things” thing. RFiD J. Last accessed August 2016
-
Ashton K (2009) That “Internet of Things” thing. RFiD J. http://www.itrco.jp/libraries/RFIDjournal-That%20Internet%20of%20Things%20Thing.pdf. Last accessed August 2016
-
-
-
-
2
-
-
84966359524
-
Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. Int J Netw Manag
-
Stergiou C, Psannis KE (2016) Recent advances delivered by mobile cloud computing and internet of things for big data applications: a survey. Int J Netw Manag. doi:10.1002/nem.1930
-
(2016)
doi:10.1002/nem.1930
-
-
Stergiou, C.1
Psannis, K.E.2
-
3
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
Shengdong X, Yuxiang W (2014) Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel Pers Commun 78(1):231–246
-
(2014)
Wirel Pers Commun
, vol.78
, Issue.1
, pp. 231-246
-
-
Shengdong, X.1
Yuxiang, W.2
-
4
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo P, Wang J, Li B, Lee S (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–936
-
(2014)
J Internet Technol
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
5
-
-
84931027814
-
HEVC in wireless environments
-
Psannis KE (2016) HEVC in wireless environments. J Real-Time Image Process 12(2):509–516
-
(2016)
J Real-Time Image Process
, vol.12
, Issue.2
, pp. 509-516
-
-
Psannis, K.E.1
-
6
-
-
70449553404
-
Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels
-
Psannis K (2009) Efficient redundant frames encoding algorithm for streaming video over error prone wireless channels. IEICE ELEX J 6(21):1497–1502
-
(2009)
IEICE ELEX J
, vol.6
, Issue.21
, pp. 1497-1502
-
-
Psannis, K.1
-
9
-
-
85013808068
-
-
Cisco (2016) “IoT Threat Environment”.:. Last accessed July
-
Cisco (2016) “IoT Threat Environment”. Available at: http://www.cisco.com/c/dam/en/us/products/collateral/se/internet-of-things/C11-735871.pdf. Last accessed July
-
-
-
-
10
-
-
78650921155
-
From today’s intranet of things to a future internet of things: a wireless- and mobility-related view
-
Zorzi M, Gluhak A, Lange S, Bassi A (2010) From today’s intranet of things to a future internet of things: a wireless- and mobility-related view. IEEE Wirel Commun 17:43–51
-
(2010)
IEEE Wirel Commun
, vol.17
, pp. 43-51
-
-
Zorzi, M.1
Gluhak, A.2
Lange, S.3
Bassi, A.4
-
11
-
-
79954631342
-
Future internet of things architecture: like mankind neural system or social organization framework?
-
Ning HS, Wang ZO (2011) Future internet of things architecture: like mankind neural system or social organization framework? IEEE Commun Lett 15:461–463
-
(2011)
IEEE Commun Lett
, vol.15
, pp. 461-463
-
-
Ning, H.S.1
Wang, Z.O.2
-
13
-
-
85013854458
-
-
Near Field Comminications History (2016) “Timeline of RFID technology”. :, Last accessed July
-
Near Field Comminications History (2016) “Timeline of RFID technology”. Available at: http://www.nfcnearfieldcommunication.org/timeline.html, Last accessed July
-
-
-
-
14
-
-
85013747407
-
-
Postscapes (2016) “History of internet of things”. :. Last accessed July
-
Postscapes (2016) “History of internet of things”. Available at: http://postscapes.com/internet-of-things-history. Last accessed July
-
-
-
-
15
-
-
80052854156
-
Securing the internet of things
-
Roman R, Najera P, Lopez J (2011) Securing the internet of things. Computer 44(9):51–58
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
16
-
-
84876943063
-
Internet of things (IoT): a vision, architectural elements, and future directions
-
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
-
(2013)
Futur Gener Comput Syst
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
17
-
-
85013818899
-
-
Welbourne E, Battle L, Cole G et al (2009) Building the Internet of things Using RFID: The RFID ecosytem experience. IEEE Computing Society. :. Last accessed July 2016
-
Welbourne E, Battle L, Cole G et al (2009) Building the Internet of things Using RFID: The RFID ecosytem experience. IEEE Computing Society. Available at: http://homes.cs.washington.edu/~magda/papers/welbourne-ieeeic09.pdf. Last accessed July 2016
-
-
-
-
19
-
-
85013805282
-
-
Chris Edwards, (2016) “ RFID tags along with the Internet of Things”, Engineering and Technology magazine vol 9, Issue 8. :, Last accessed July
-
Chris Edwards, (2016) “ RFID tags along with the Internet of Things”, Engineering and Technology magazine vol 9, Issue 8. Available at: http://eandt.theiet.org/magazine/2014/08/tagging-along.cfm, Last accessed July
-
-
-
-
20
-
-
85013821941
-
-
Thrasher J (2016) “A primer on the internet of things and RFID”. :. Last accessed July
-
Thrasher J (2016) “A primer on the internet of things and RFID”. Available at: http://blog.atlasrfidstore.com/internet-of-things-and-rfid. Last accessed July
-
-
-
-
22
-
-
36248982045
-
SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Chien H-Y (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secur Comput 4(4):337–340
-
(2007)
IEEE Trans Dependable Secur Comput
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
23
-
-
2942625823
-
-
Florida, USA
-
Henrici A, Muller P (2004) “Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers”. In: International Workshop on Pervasive Computing and Communication Security PerSec, Orlando, Florida, USA, pp 149–153 (ISBN: 0-7695-2106-1)
-
(2004)
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers”. In: International Workshop on Pervasive Computing and Communication Security PerSec, Orlando
, pp. 149-153
-
-
Henrici, A.1
Muller, P.2
-
24
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Molnar D, Wagner D (2004) “Privacy and security in library RFID: Issues, practices, and architectures”. In: Conference on Computer and Communications Security—ACM CCS, Washington, DC, USA, pp 210–219 (ISBN:1-58113-961-6)
-
(2004)
In: Conference on Computer and Communications Security—ACM CCS, Washington, DC, USA, pp 210–219 (ISBN:1-58113-961-6)
-
-
Molnar, D.1
Wagner, D.2
-
26
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Rhee K, Kwak J, Kim S, Won D (2005) Challenge-response based RFID authentication protocol for distributed database environment. Int Conf Secur Pervasive Comput SPC 2005:70–84
-
(2005)
Int Conf Secur Pervasive Comput SPC
, vol.2005
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
27
-
-
33144457479
-
RFID security and privacy: a research survey
-
Jules A (2006) RFID security and privacy: a research survey. IEEE J Sel Areas Commun 24(2):381–394
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.2
, pp. 381-394
-
-
Jules, A.1
-
28
-
-
33745181952
-
Authenticating pervasive devices with human protocols. CRYPTO’05., vol 3126 of LNCS, IACR
-
Juels A, Weis S (2005) Authenticating pervasive devices with human protocols. CRYPTO’05., vol 3126 of LNCS, IACR. Springer, Heidelberg, pp 293–308
-
(2005)
Springer, Heidelberg
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
30
-
-
33750067948
-
-
Springer, Berlin
-
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador J, Ribagorda A (2006) ”M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags”. Lecture Notes in Computer Science, pp 912–923. Springer, Berlin
-
(2006)
”M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags”. Lecture Notes in Computer Science, pp 912–923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
31
-
-
33845455482
-
EMAP: an efficient mutual authentication protocol for low-cost RFID Tags
-
Springer, Berlin
-
Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) “EMAP: an efficient mutual authentication protocol for low-cost RFID Tags”. OTM Federated Conferences and Workshop: IS Workshop, IS’06, 4277 Lecture Notes in Computer Science, pp 352–361. Springer, Berlin
-
(2006)
OTM Federated Conferences and Workshop: IS Workshop, IS’06, 4277 Lecture Notes in Computer Science, pp 352–361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
32
-
-
70350625235
-
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol,
-
Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Ribagorda A (2008) “Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol,”. In: Proceedings of International Workshop on Information Security Applications, pp 56–68
-
(2008)
In: Proceedings of International Workshop on Information Security Applications, pp 56–68
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Tapiador, J.M.E.3
Ribagorda, A.4
-
33
-
-
84947910726
-
-
Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators, Fast Software Encryption, LNCS, vol 1372, Springer, Berlin. pp 168–188 (ISBN: 978-3-540-69710-71998)
-
Springer, Berlin
, pp. 168-188
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
34
-
-
84857498128
-
Security analysis of an ultra-lightweight RFID authentication protocol-SLMAP*
-
Erguler I, Unsal C, Anarim E, Saldamli G (2012) Security analysis of an ultra-lightweight RFID authentication protocol-SLMAP*. Secur Comm Netw 5:287–291
-
(2012)
Secur Comm Netw
, vol.5
, pp. 287-291
-
-
Erguler, I.1
Unsal, C.2
Anarim, E.3
Saldamli, G.4
-
37
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
-
Phan R (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320
-
(2008)
IEEE Trans Dependable Secur Comput
, vol.6
, Issue.4
, pp. 316-320
-
-
Phan, R.1
-
38
-
-
45749087762
-
Traceable privacy of recent provably-secure RFID protocols”. Proceedings of Sixth Int’l Conf
-
Ouafi K, Phan RC-W (2008) “Traceable privacy of recent provably-secure RFID protocols”. Proceedings of Sixth Int’l Conf. Applied Cryptography and Network Security (ACNS ’08), pp 479–489
-
(2008)
Applied Cryptography and Network Security (ACNS ’08)
, pp. 479-489
-
-
Ouafi, K.1
Phan, R.C.-W.2
-
41
-
-
84862788058
-
A new ultralightweight RFID authentication protocol with permutation
-
Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705
-
(2012)
IEEE Commun Lett
, vol.16
, Issue.5
, pp. 702-705
-
-
Tian, Y.1
Chen, G.2
Li, J.3
|