Subject
Computer Networks and Communications
Reference65 articles.
1. Sybil attacks and their defenses in the internet of things;Zhang;Internet Things J. IEEE,2014
2. Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things;Cervantes,2015
3. Z. Shelby, K. Hartke, C. Bormann, B. Frank, Constrained application protocol (coap), draft-ietf-core-coap-18 (work in progress), sl: Ietf 2013.
4. Eap for iot: More efficient transport of authentication data – tepanom case study;Pawlowski,2015
5. The internet of things: A survey;Atzori;Comput. netw.,2010
Cited by
95 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献