Author:
Sinha Nidhi,Sundaram Meenatchi,Sinha Abhijit
Reference26 articles.
1. Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile RFC 5280
2. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision architectural elements and future directions. Futur Gener Comput Syst 29(7):1645–1660
3. Pacheco J, Hariri S (2016) IoT Security framework for smart cyber infrastructures. In: IEEE 1st International workshops on foundations and applications of self* systems (FAS*W). pp 242–247
4. Olesia V, Leonid Kupershtein, Olga Shulyatitska, Viktor Malyushytskyy, The authentication method in wireless sensor networks based on trust model. In: IEEE first Ukraine conference on electrical and computer engineering (UKRCON), pp 993–997
5. Porambage P, Schmitt C, Gurtov A, Gerdes S (2014) PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int J Distrib Sens Netw (357430)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献