Author:
Sanchez Guerrero Javier,Vaca Alban Robert,Guachimboza Marco,Páez Quinde Cristina,Narváez Ríos Margarita,Jimenez Ruiz Luis Alfredo
Publisher
Springer International Publishing
Reference30 articles.
1. Allen, N.: Weaknesses cybersecurity to make smart cities threaten more costly and dangerous than analog their prdecessors. USAPP
2. Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)
3. Breezely George, M., Igni Sabasti Prabu, S.: Secured key sharing in cloud storage using elliptic curve cryptography. In: Proceedings of the International Conference on Soft Computing Systems (2015)
4. Chaitanya, B., Sekhar, C., Ramesh, N.: IR IOT based smart device using CC3200. Sci. Technol
5. Chen, S., Maode, M., Zhenxing, L.: With an authentication scheme for identity-based cryptography M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146–1157 (2016)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptographic Systems and Threats in e-Commerce;Internet of Things, Infrastructures and Mobile Applications;2020-09-10
2. PKIoT: A public key infrastructure for the Internet of Things;Transactions on Emerging Telecommunications Technologies;2019-07-08