Author:
Das Ayan Kumar,Tabassum Ayesha,Sadaf Sayema,Sinha Ditipriya
Reference18 articles.
1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 787–2805 (2010)
2. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)
3. Kim, H., Wasicek, A., Mehne, B., Lee, E.A.: A secure network architecture for the internet of things based on local authorization entities. In: IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (2016)
4. Kovacs, E.: 70% of Internet of Things Devices Reveal Vulnerabilities. Hewlett Packard.
http://www8.hp.com/us/en/hp-news/press-release.html?id=1744676#,V-e1I7Wa1fA
5. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献