Author:
Asaithambi Asai,Dutta Ayan,Rao Chandrika,Roy Swapnoneel
Publisher
Springer International Publishing
Reference18 articles.
1. Lecture Notes in Computer Science;GD Abowd,1999
2. Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inform. 14(6), 2736–2744 (2018)
3. Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., Möller, S.: On the need for different security methods on mobile phones. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 465–473. ACM (2011)
4. Botezatu, N., Manta, V., Stan, A.: Self-adaptability in secure embedded systems: an energy-performance trade-off. In: The 2011 International Conference on Information Security and Internet Engineering, World Congress on Engineering (2011)
5. Chakrabarty, D., Zhou, Y., Lukose, R.: Online knapsack problems. In: Workshop on Internet and Network Economics (WINE) (2008)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献