-
1
-
-
84962424981
-
BSN-care: A secure IoT-based modern healthcare system using body sensor network
-
Mar.
-
P. Gope and T. Hwang, "BSN-care: A secure IoT-based modern healthcare system using body sensor network, " IEEE Sensors J., vol. 16, no. 5, pp. 1368-1376, Mar. 2016.
-
(2016)
IEEE Sensors J.
, vol.16
, Issue.5
, pp. 1368-1376
-
-
Gope, P.1
Hwang, T.2
-
2
-
-
84938412832
-
Untraceable sensor movement in distributed IoT infrastructure
-
Sep.
-
P. Gope and T. Hwang, "Untraceable sensor movement in distributed IoT infrastructure, " IEEE Sensors J., vol. 15, no. 9, pp. 5340-5348, Sep. 2015.
-
(2015)
IEEE Sensors J.
, vol.15
, Issue.9
, pp. 5340-5348
-
-
Gope, P.1
Hwang, T.2
-
4
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi, R. Needham, "A logic of authentication, " ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
84919978090
-
Securing the Internet of Things: A standardization perspective
-
Jun.
-
S. L. Keoh, S. S. Kumar, H. Tschofenig, "Securing the Internet of Things: A standardization perspective, " IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, Jun. 2014.
-
(2014)
IEEE Internet Things J.
, vol.1
, Issue.3
, pp. 265-275
-
-
Keoh, S.L.1
Kumar, S.S.2
Tschofenig, H.3
-
6
-
-
85015150805
-
-
[Online]. Available
-
(2016). The Bouncy Castle Crypto APIs. [Online]. Available: https://www. bouncycastle. org/
-
(2016)
The Bouncy Castle Crypto APIs
-
-
-
7
-
-
84883421524
-
A lightweight multicast authentication mechanism for small scale IoT applications
-
Oct.
-
X. Yao, X. Han, X. Du, X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications, " IEEE Sensors J., vol. 13, no. 10, pp. 3696-3701, Oct. 2013.
-
(2013)
IEEE Sensors J.
, vol.13
, Issue.10
, pp. 3696-3701
-
-
Yao, X.1
Han, X.2
Du, X.3
Zhou, X.4
-
9
-
-
84984677345
-
Intelligent device-to-device communication in the Internet of Things
-
Sep.
-
O. Bello and S. Zeadally, "Intelligent device-to-device communication in the Internet of Things, " IEEE Syst. J., vol. 10, no. 3, pp. 1172-1182, Sep. 2016.
-
(2016)
IEEE Syst. J.
, vol.10
, Issue.3
, pp. 1172-1182
-
-
Bello, O.1
Zeadally, S.2
-
10
-
-
84900407033
-
Design and implementation of a WiFi sensor device management system
-
Mar.
-
X. Cai, Y. Wang, X. Zhang, L. Luo, "Design and implementation of a WiFi sensor device management system, " Proc. IEEE World Forum Internet Things (WF-IoT), Mar. 2014, pp. 10-14.
-
(2014)
Proc. IEEE World Forum Internet Things (WF-IoT)
, pp. 10-14
-
-
Cai, X.1
Wang, Y.2
Zhang, X.3
Luo, L.4
-
11
-
-
85030455878
-
Effectively collecting data for the location-based authentication in Internet of Things
-
Sep.
-
Y. Kawamoto, H. Nishiyama, N. Kato, Y. Shimizu, A. Takahara, T. Jiang, "Effectively collecting data for the location-based authentication in Internet of Things, " IEEE Syst. J., no. 99, pp. 1-9, Sep. 2015, doi: 10. 1109/JSYST. 2015. 2456878.
-
(2015)
IEEE Syst. J.
, Issue.99
, pp. 1-9
-
-
Kawamoto, Y.1
Nishiyama, H.2
Kato, N.3
Shimizu, Y.4
Takahara, A.5
Jiang, T.6
-
12
-
-
84916934620
-
IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
-
Feb.
-
S. Cirani, M. Picone, P. Gonizzi, L. Veltri, G. Ferrari, "IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios, " IEEE Sensors J., vol. 15, no. 2, pp. 1224-1234, Feb. 2015.
-
(2015)
IEEE Sensors J.
, vol.15
, Issue.2
, pp. 1224-1234
-
-
Cirani, S.1
Picone, M.2
Gonizzi, P.3
Veltri, L.4
Ferrari, G.5
-
13
-
-
84923205438
-
Aggregated-proof based hierarchical authentication scheme for the Internet of Things
-
Mar.
-
H. Ning, H. Liu, L. T. Yang, "Aggregated-proof based hierarchical authentication scheme for the Internet of Things, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 3, pp. 657-667, Mar. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.3
, pp. 657-667
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
14
-
-
84928015480
-
Toward a lightweight authentication and authorization framework for smart objects
-
Apr.
-
J. L. Hernández-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, L. Ladid, "Toward a lightweight authentication and authorization framework for smart objects, " IEEE J. Sel. Areas Commun., vol. 33, no. 4, pp. 690-702, Apr. 2015.
-
(2015)
IEEE J. Sel. Areas Commun.
, vol.33
, Issue.4
, pp. 690-702
-
-
Hernández-Ramos, J.L.1
Pawlowski, M.P.2
Jara, A.J.3
Skarmeta, A.F.4
Ladid, L.5
-
15
-
-
85007447127
-
-
Nov. accessed on Dec. 5, 2016. [Online]. Available
-
Samuel Gibbs. (Nov. 2015). Hackers Can Hijack Wi-Fi Hello Bar-bie to Spy on Your Children, accessed on Dec. 5, 2016. [Online]. Available: http://www. theguardian. com/technology/2015/nov/26/hackerscan-hijack-wifi-hello-barbie-to-spy-on-your-children
-
(2015)
Hackers Can Hijack Wi-Fi Hello Bar-bie to Spy on Your Children
-
-
Gibbs, S.1
|