Author:
Bhattacharjya Aniruddha,Zhong Xiaofeng,Wang Jing,Li Xing
Publisher
Springer International Publishing
Reference59 articles.
1. Jara A, Kafle V, Skarmeta A (2013) Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture. Int J Ad Hoc Ubiquitous Comput 13(3-4):228–242
2. Li S, Gong P, Yang Q, Li M, Kong J, Li P (2013) A secure handshake scheme for mobile-hierarchy city intelligent transportation system. In: International conference on ubiquitous and future networks. ICUFN, Da Nang, pp 190–191
3. Kang KC, Pang ZB, Wang CC (2013) Security and privacy mechanism for health internet of things. J China Univ Posts Telecommun 20(Suppl 2):64–68
4. Goncalves F, Macedo J, Nicolau M, Santos A (2013) Security architecture for mobile e-health applications in medication control. In: 2013 21st international conference on software, telecommunications and computer networks. SoftCOM, Primosten, pp 1–8
5. An J, Gui X, Zhang W, Jiang J, Yang J (2013) Research on social relations cognitive model of mobile nodes in internet of things. J. Netw Comput Appl 36(2):799–810
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Various Security Attacks on IoT Devices Using Multi-Layer Neural Network Model Over Sensor Networks;2023 International Conference on Computational Intelligence, Networks and Security (ICCINS);2023-12-22
2. Comparative Analysis of Security Techniques in Internet of Things;2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC);2022-11-25
3. An Exploratory Study on Chatbots;2022 2nd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS);2022-11-04
4. CoAP and MQTT: Characteristics and Security;Lecture Notes on Data Engineering and Communications Technologies;2022-09-01
5. Trusted and Secure Blockchain-Based Architecture for Internet-of-Medical-Things;Electronics;2022-08-16