Author:
Kaur Gagandeep,Saini Kamaljit Singh
Reference15 articles.
1. Alsaadi E, Tubaishat A (2015) Internet of things features, challenges, vulnerabilities. Int J Adv Comput Sci Inf Technol (IJACSIT) 3(1):1–13
2. Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. Int J Secur Appl 9(4):289–306
3. Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of internet of things: applications, challenges, and opportunities with china perspective: IEEE Internet Things J 1(4)
4. Cirani S, Picone M, Gonizzi P, Veltri L, Ferrari G (2015) IoT—OAS: OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sens J 15(2)
5. Dieter S, Kelly T, Suryadevara NK, Mukhopdhayay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献