-
1
-
-
84863689635
-
Internet of things strategic research roadmap
-
Vermesan, P., Friess, P., Guillemin, S., Gusmeroli, H., Sundmaeker, A., Bassi, I.S., Jubert, M., Mazura, M., Harrison, M.D.: Internet of things strategic research roadmap. In: Cluster of European Research Projects on the Internet of Things, CERP-IoT (2011)
-
(2011)
Cluster of European Research Projects on the Internet of Things, Cerp-Iot
-
-
Vermesan, P.1
Friess, P.2
Guillemin, S.3
Gusmeroli, H.4
Sundmaeker, A.5
Bassi, I.S.6
Jubert, M.7
Mazura, M.8
Harrison, M.D.9
-
2
-
-
53249142256
-
Formalizing and securing relationships on public networks
-
SZABO, Nick: Formalizing and securing relationships on public networks. First Monday, 2 (9) (1997)
-
(1997)
First Monday
, vol.2
, Issue.9
-
-
Szabo, N.1
-
4
-
-
84921628525
-
Dcapbac: Embedding authorization logic into smart things through ecc optimizations
-
Hernández-Ramos, J.L., Jara, A.J., Leandro, M., et al.: Dcapbac: embedding authorization logic into smart things through ecc optimizations. Int. J. Comput. Math. no ahead-of-print, 1–22 (2014)
-
(2014)
Int. J. Comput. Math. No Ahead-Of-Print
, pp. 1-22
-
-
Hernández-Ramos, J.L.1
Jara, A.J.2
Leandro, M.3
-
5
-
-
84883665974
-
Authorization framework for the internet-of-things
-
IEEE
-
Seitz, L., Selander, G., Gehrmann, C.: Authorization framework for the internet-of-things. In: 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2013)
-
(2013)
2013 IEEE 14Th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (Wowmom)
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
-
6
-
-
84895539842
-
The OAuth 2.0 authorization framework
-
Hardt, D. (ed.): The OAuth 2.0 authorization framework. In: IETF, RFC6749, October 2012
-
(2012)
IETF, RFC6749
-
-
Hardt, D.1
-
7
-
-
84989926545
-
-
Connect All IP-Based Smart Objects (CALIPSO)—FP7 EU Project [Online], Accessed 15 Oct 2014
-
Connect All IP-Based Smart Objects (CALIPSO)—FP7 EU Project [Online]. http://www.ictcalipso.eu/. Accessed 15 Oct 2014
-
-
-
-
8
-
-
84916934620
-
Iot-oas: An OAuth-based authorization service architecture for secure services in IoT scenarios
-
Cirani, S., Picone, M., Gonizzi, P., Veltri, L., Ferrari, G.: Iot-oas: an OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens. J. 15(2), 1224–1234 (2015)
-
(2015)
IEEE Sens. J
, vol.15
, Issue.2
, pp. 1224-1234
-
-
Cirani, S.1
Picone, M.2
Gonizzi, P.3
Veltri, L.4
Ferrari, G.5
-
9
-
-
84989855768
-
-
IBM
-
Sanjay, P., Sumabala, N., Paul, B., Pureswaran, V.: ADEPT: an IoT practitioner perspective, Draft copy for advance review. IBM (2015)
-
(2015)
ADEPT: An Iot Practitioner Perspective, Draft Copy for Advance Review
-
-
Sanjay, P.1
Sumabala, N.2
Paul, B.3
Pureswaran, V.4
-
10
-
-
84945945234
-
Decentralizing privacy: Using blockchain to protect personal data
-
IEEE (2015). Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system
-
Zyskind, G., Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: Security and Privacy Workshops (SPW), 2015 IEEE, pp. 180–184. IEEE (2015). Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system (2008)
-
(2008)
Security and Privacy Workshops (SPW), 2015 IEEE
, pp. 180-184
-
-
Zyskind, G.1
Nathan, O.2
|