Author:
Karthikeyan S.,Patan Rizwan,Balamurugan B.
Reference24 articles.
1. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., & Wehrle, K. (2011). Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.
2. Liu, J., Yang, X., & Philip Chen, C. L. (2012). Authentication and access control in the internet of things. In 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), (pp. 588–592). IEEE.
3. Suo, H., Wan, J., Zou, C., Liu, J. (2012). Security in the internet of things: A review. In 2012 International Conference on Computer Science and Electronics Engineering.
4. Alrawais, A., Abdulrahman A., & Xiuzhen C. (2015). X. 509 Check: A Tool to Check the Safety and Security of Digital Certificates. In 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI) (pp. 130–133). IEEE.
5. Ranjan, A. K., Kumar, V., & Hussain, M. (2014). Security analysis of TLS authentication. In Proceedings of the International Conference on Contemporary Computing and Informatics (IC3I) (pp. 1356–1360), November 2014.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献