Author:
Henaien Amira,BelHadj Hadda
Publisher
Springer International Publishing
Reference17 articles.
1. Agadakos, I., Hallgren, P., Damopoulos, D., Sabelfeld, A., Portokalidis, G.: Location-enhanced authentication using the IoT: because you cannot be in two places at once. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 251–264. ACSAC’16, ACM, New York (2016).
https://doi.org/10.1145/2991079.2991090
2. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)
3. Alharam, A.K., El-madany, W.: Complexity of cyber security architecture for IoT healthcare industry: a comparative study. In: 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 246–250. IEEE (2017)
4. Baker, S.B., Xiang, W., Atkinson, I.: Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017)
5. Bernal Bernabe, J., Hernandez-Ramos, J.L., Skarmeta Gomez, A.F.: Holistic privacy-preserving identity management system for the Internet of things. Mob. Inf. Syst. 2017, 1–20 (2017)