Author:
Ragab Ahmed Ab. M.,Madani Ahmed,Wahdan A. M.,Selim Gamal M. I.
Publisher
Springer International Publishing
Reference45 articles.
1. Bhardwaj, S., Kole, A.: Review and study of the internet of things: it’s the future. In: 2016 IEEE International Conference on Intelligent Control Power and Instrumentation (ICICPI)
2. Demblewski, M.: Security frameworks for machine-to-machine devices and networks. Ph.D. thesis, Nova Southeastern University (2015).
https://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1068&context=gscis_etd
. Accessed 10 Feb 2019
3. Ali, B., Awad, A.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3), 817 (2018)
4. Chandra, S., Paira, S., Alam, S., Sanya, G.: A comparative survey of symmetric and asymmetric key cryptography. In: International Conference on Electronics, Communication and Computational Engineering (ICECCE) (2014)
5. Kumar, Y., Munjal, R., Sharma, H.: Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int. J. Comput. Sci. Manag. Stud. 11(03), 60–63 (2011)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献