Author:
Wang Yongkang,Chen Chunxia,Jiang Qijie
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference12 articles.
1. Zeng, M., Wang, S.: Fuzzy comprehensive evaluation algorithm for power information system security level based on the Internet of Things. Int. J. Online Eng. 12(5), 17–19 (2016)
2. Ray, B.R., Abawajy, J., Chowdhury, M.: Scalable rid security framework and protocol supporting Internet of Things. Comput. Netw. 67(10), 89–103 (2014)
3. Mingxin, W.: A design of solving the security problem of Internet of Things based on ellipse curve algorithm. Sens. Transducers 160(12), 570–577 (2013)
4. Li, Y., Cao, Y.: Performance evaluation and analysis of lightweight symmetric encryption algorithms for Internet of Things. Int. J. Reason. Intell. Syst. 8(1), 84–89 (2016)
5. Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Lightweight collaborative key establishment scheme for the Internet of Things. Comput. Netw. 64(7), 273–295 (2014)
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献