Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference61 articles.
1. Ahmed MR, Huang X, Sharma D, Cui H (2012) Wireless sensor network: Characteristics and architectures. Int J Inf Commun Eng 6(12):1398–1401
2. Henze M, Hermerschmidt L, Kerpen D, Häußling R, Rumpe B, Wehrle K (2016) A comprehensive approach to privacy in the cloud-based Internet of Things. Futur Gener Comput Syst 56:701–718
3. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: Perspectives and challenges. Wirel Netw 20(8):2481–2501
4. Li L (2012) Study on security architecture in the Internet of Things. In: Proceedings of 2012 international conference on measurement, information and control, vol 1. IEEE, Piscataway, pp 374–377
5. Farash MS, Turkanović M, Kumari S, Hölbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36:152–176
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献