Author:
Al Gaith,Doss Robin,Chowdhury Morshed
Publisher
Springer International Publishing
Reference19 articles.
1. Communications in Computer and Information Science;G Al.,2016
2. Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Network Comput. Appl. 42, 120–134 (2014)
3. Fernández-Caramés, T.M., Fraga-Lamas, P., Suárez-Albela, M., Castedo, L.: Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications. Sensors 17(1), 28 (2016)
4. Ashraf, Q.M., Habaebi, M.H., Sinniah, G.R., Chebil, J.: Broadcast based registration technique for heterogenous nodes in the IoT. In: International Conference on Control, Engineering, and Information Technology (CEIT 2014), Sousse (2014)
5. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219. ACM (2004)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献