共 50 条
- [1] Analysis of Authentication Techniques in Internet of Things (IoT) [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
- [2] Securing the Internet of Things (IoT): A Security Taxonomy for IoT [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168
- [3] Internet of Things (IoT): Taxonomy of Security Attacks [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326
- [5] Research of authentication techniques for the Internet of things [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
- [6] A Survey on Authentication Techniques for the Internet of Things [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
- [7] A Survey on Authentication Techniques for the Internet of Things [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
- [8] Authentication Techniques for the Internet of Things: A Survey [J]. 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
- [9] A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT) [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 1244 - 1248
- [10] Configurable Anonymous Authentication Schemes For The Internet of Things (IoT) [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2019,