-
4
-
-
84866949605
-
Internet of things strategic research roadmap
-
O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al.-"Internet of Things Strategic Research Roadmap", Internet of Things-Global Technological and Societal Trends, 2011
-
(2011)
Internet of Things-Global Technological and Societal Trends
-
-
Vermesan, O.1
Friess, P.2
Guillemin, P.3
Gusmeroli, S.4
Sundmaeker, H.5
Bassi, A.6
Jubert, I.S.7
Mazura, M.8
Harrison, M.9
Eisenhauer, M.10
-
5
-
-
84903266454
-
Object classification based context management for identity management in internet of things
-
P. N. Mahalle, N. R. Prasad, R. Prasad-"Object classification based context management for identity management in internet of things", International Journal of Computer Applications, vol. 63, no. 12, 2013
-
(2013)
International Journal of Computer Applications
, vol.63
, Issue.12
-
-
Mahalle, P.N.1
Prasad, N.R.2
Prasad, R.3
-
8
-
-
84883314073
-
Lithe: Lightweight secure coap for the internet of things
-
October
-
Shahid Raza, René Hummen-"Lithe: Lightweight Secure CoAP for the Internet of Things", IEEE Sensors Journal, October 2013
-
(2013)
IEEE Sensors Journal
-
-
Raza, S.1
Hummen, R.2
-
10
-
-
84899964285
-
Concepts of security threats, challenges, vulnerabilities and risks
-
Springer
-
H. G. Brauch-"Concepts of security threats, challenges, vulnerabilities and risks", Coping with Global Environmental Change, Disasters and Security, Springer, 2011
-
(2011)
Coping with Global Environmental Change, Disasters and Security
-
-
Brauch, H.G.1
-
11
-
-
84981345883
-
Security architecture of the internet of things oriented to perceptual layer
-
Weizhe Zhang, Baosheng Qu-"Security Architecture of the Internet of Things Oriented to Perceptual Layer", International Journal on Computer, Consumer and Control (IJ3C), Vol. 2, No.2(2013)
-
(2013)
International Journal on Computer, Consumer and Control (IJ3C)
, vol.2
, Issue.2
-
-
Zhang, W.1
Qu, B.2
-
12
-
-
84941231989
-
Practical issues with datagram transport layer security in constrained environments
-
Universität Bremen TZI, April 8
-
K. Hartke-"Practical Issues With Datagram Transport Layer Security in Constrained Environments", DICE Working Group, Internet-Draft, Universität Bremen TZI, April 8, 2014.
-
(2014)
DICE Working Group, Internet-Draft
-
-
Hartke, K.1
-
13
-
-
85027515067
-
(De-)constructing tls 1.3
-
Bangalore, India, December 6-9
-
Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi-"(De-)Constructing TLS 1.3", Proceedings of Progress in Cryptology-INDOCRYPT 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9 2015
-
(2015)
Proceedings of Progress in Cryptology-INDOCRYPT 2015: 16th International Conference on Cryptology in India
-
-
Kohlweiss, M.1
Maurer, U.2
Onete, C.3
Tackmann, B.4
Venturi, D.5
-
15
-
-
0003344055
-
X.509 internet public key infrastructure online certificate status protocol-ocsp
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams-"X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP", RFC 2560, 1999.
-
(1999)
RFC 2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
16
-
-
84955468238
-
Transport layer security (tls) extensions: Extension definitions
-
D. Eastlake-"Transport Layer Security (TLS) Extensions: Extension Definitions", RFC 6066, 2011.
-
(2011)
RFC 6066
-
-
Eastlake, D.1
-
18
-
-
84938672829
-
Security for the internet of things: A survey of existing protocols and open research issues
-
Third Quarter
-
Jorge Granjal, Edmundo Monteiro, Jorge dá Silva-"Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues", IEEE Communication Surveys & Tutorials, Vol. 17, No. 3, Third Quarter 2015
-
(2015)
IEEE Communication Surveys & Tutorials
, vol.17
, Issue.3
-
-
Granjal, J.1
Monteiro, E.2
Dá Silva, J.3
-
19
-
-
84941085241
-
Internet of things: A survey on enabling technologies, protocols, and applications
-
Fourth Quarter
-
Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari and Moussa Ayyash-"Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications", IEEE Communication Surveys & Tutorials, Vol. 17, No. 4, Fourth Quarter 2015
-
(2015)
IEEE Communication Surveys & Tutorials
, vol.17
, Issue.4
-
-
Al-Fuqaha, A.1
Guizani, M.2
Mohammadi, M.3
Aledhari, M.4
Ayyash, M.5
-
20
-
-
85000402260
-
Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks"-river publishers
-
Mohamed Abomhara, Geir M. Køien-"Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks"-River Publishers 2015, Journal of Cyber Security, Vol. 4
-
(2015)
Journal of Cyber Security
, vol.4
-
-
Abomhara, M.1
Køien, G.M.2
-
23
-
-
70249090090
-
Trust in m2m communication
-
I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, M. V. Meyerstein-"Trust in M2M Communication", Vehicular Technology Magazine, IEEE, vol. 4, no. 3, 2009
-
(2009)
Vehicular Technology Magazine, IEEE
, vol.4
, Issue.3
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.U.3
Leicher, A.4
Meyerstein, M.V.5
-
24
-
-
85000445039
-
-
Springer, LNCS
-
S. Andreev, Y. Koucheryavy-"Internet of Things, Smart Spaces, and Next Generation Networking", Springer, LNCS, vol. 7469
-
Internet of Things, Smart Spaces, and Next Generation Networking
, vol.7469
-
-
Andreev, S.1
Koucheryavy, Y.2
-
25
-
-
84867868398
-
Analysis of security threats, requirements, technologies and standards in wireless sensor networks
-
V. Springer
-
J. Lopez, R. Roman, C. Alcaraz-"Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks", Foundations of Security Analysis and Design V. Springer, 2009
-
(2009)
Foundations of Security Analysis and Design
-
-
Lopez, J.1
Roman, R.2
Alcaraz, C.3
-
26
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, J. Lopez-"On the Features and Challenges of Security and Privacy in Distributed Internet of Things", Computer Networks, vol. 57, no. 10, 2013
-
(2013)
Computer Networks
, vol.57
, Issue.10
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
27
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac-"Internet of Things: Vision, Applications and Research Challenges", Ad Hoc Networks, vol. 10, no. 7, 2012
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
28
-
-
84936802475
-
Security and privacy in the internet of things: Current status and open issues
-
Aalborg, Denmark, May
-
M. Abomhara, G. Koien-"Security and privacy in the internet of things: Current status and open issues", PRISMS 2014, the 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014
-
(2014)
PRISMS 2014, the 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014)
-
-
Abomhara, M.1
Koien, G.2
-
29
-
-
84889957247
-
Web services threats, vulnerabilities, and countermeasures
-
Springer
-
E. Bertino, L. D. Martino, F. Paci, A. C. Squicciarini-"Web services threats, vulnerabilities, and countermeasures", Security for Web Services and Service-Oriented Architectures, Springer, 2010
-
(2010)
Security for Web Services and Service-Oriented Architectures
-
-
Bertino, E.1
Martino, L.D.2
Paci, F.3
Squicciarini, A.C.4
-
31
-
-
84889957247
-
Web services threats, vulnerabilities, and countermeasures
-
Springer
-
E. Bertino, L. D. Martino, F. Paci, A. C. Squicciarini-"Web services threats, vulnerabilities, and countermeasures", Security for Web Services and Service-Oriented Architectures, Springer, 2010
-
(2010)
Security for Web Services and Service-Oriented Architectures
-
-
Bertino, E.1
Martino, L.D.2
Paci, F.3
Squicciarini, A.C.4
|