Author:
Vidwans Abhinav,Ramaiya Manoj
Publisher
Springer Nature Singapore
Reference25 articles.
1. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Fut Gener Comput Syst 29(7):1645–1660
2. Vasseur J-P, Dunkels A (2010) Interconnecting smart objects with IP: the next internet. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
3. Henriques MS, Vernekar NK (2017) Using symmetric and asymmetric cryptography to secure communication between devices in IoT. Int Conferen IoT Appl (ICIOT) 2017:1–4. https://doi.org/10.1109/ICIOTA.2017.8073643
4. Dheresh S, Atish M, Satyendra ST, Nishant C (2011) Applying frequent pattern mining in cloud computing environment. Int J Adv Comput Res (IJACR) 1(2):84–88
5. Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: Distributed computing in sensor systems (DCOSS), 2013 ieee international conference on IEEE, pp 351–355