共 50 条
- [21] Cryptographically secure identity certificates [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
- [22] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
- [23] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 151 - 167
- [24] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices [J]. World Wide Web, 2018, 21 : 151 - 167
- [25] Secure IoT Devices for the Maintenance of Machine Tools [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE IN THROUGH-LIFE ENGINEERING SERVICES, 2017, 59 : 150 - 155
- [27] Secure Connection Assistance Architecture for IoT Devices [J]. 2016 22ND IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN), 2016,
- [28] Protection Profile Bricks for Secure IoT Devices [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 8 - 13
- [29] Secure and Efficient Control Transfer for IoT Devices [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,