Author:
Biswal Asutosh Kumar,Maiti Prasenjit,Bebarta Sodyam,Sahoo Bibhudatta,Turuk Ashok Kumar
Reference39 articles.
1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 2787–2805 (2010)
2. Ahmed, W., Anwar, S., Arshad, M.: Security architecture of 3GPP LTE and LTE-a network: a review. Int. J. Multidisc. Sci. Eng. 7(1) (2016)
3. Chen, D., Chang, G., Jin, L., Ren, X., Li, J., Li, F.: A novel secure architecture for the Internet of Things. In: 2011 Fifth International Conference on Genetic and Evolutionary Computing, pp. 311–314 (2011)
4. Lee, Y., Lim, J., Jeon, Y., Kim, J.: Technology trends of access control in IoT and requirements analysis. In: 2015 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1031–1033 (2015)
5. Hammi, M.T., Bellot, P., Serhrouchni, A.: BCTrust: a decentralized authentication blockchain-based mechanism. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, pp. 1–6 (2018)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献