Author:
Shah Syed W.,Syed Naeem F.,Shaghaghi Arash,Anwar Adnan,Baig Zubair,Doss Robin
Subject
Law,General Computer Science
Reference38 articles.
1. Techniques and algorithms for access control list optimization;Abdulmohsin;Computers & Electrical Engineering,2009
2. Token-based security for the internet of things with dynamic energy-quality tradeoff;Aman;IEEE Internet Things J.,2018
3. Towards continuous authentication in internet of things based on secret sharing scheme;Bamasag,2015
4. Fast authentication in wireless sensor networks;Benzaid;Future Generation Computer Systems,2016
5. Iotsense: behavioral fingerprinting of iot devices;Bezawada;arXiv preprint arXiv:1804.03852,2018
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献