Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference26 articles.
1. Huber R, Sommer P, Wattenhofer R (2011) Demo abstract: debugging wireless sensor network simulations with YETI and COOJA. Proceedings of the 10th ACM/IEEE international conference on information processing in sensor networks, pp. 141–142
2. Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155
3. Shi W, Kumar N (2015) Peng GongNaveen Chilamkurti, Hangbae Chang, on the security of a certificateless online/offline signcryption for internet of things. Peer-to-Peer Netw Appl 8(5):881–885
4. Li C-T, Lee C-C, Weng C-Y, Chen C-M (2018) Towards secure authenticating of cache in the reader for RFID-based IoT systems. Peer-to-Peer Netw Appl 11(1):198–208
5. Yu Z, Wen J (2017) The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw Appl 10(4):983–994
Cited by
62 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献