共 50 条
- [2] Secure and Efficient CoAP Based Authentication and Access Control for Internet of Things (IoT) [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1245 - 1250
- [3] Security analysis and improvements of authentication and access control in the internet of things [J]. Sensors (Switzerland), 2014, 14 (08): : 14786 - 14805
- [4] Security Analysis and Improvements of Authentication and Access Control in the Internet of Things [J]. SENSORS, 2014, 14 (08): : 14786 - 14805
- [5] Authentication, Authorization, Access Control, and Key Exchange in Internet of Things [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (02):
- [6] Authentication and Context Awareness Access Control in Internet of Things: A Review [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 630 - 635
- [7] Taxonomy of Authentication Techniques in Internet of Things (IoT) [J]. PROCEEDINGS OF THE 2017 IEEE 15TH STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2017, : 67 - 71
- [9] Analysis of Authentication Techniques in Internet of Things (IoT) [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
- [10] Home Telehealth by Internet of Things (IoT) [J]. 2015 IEEE 28TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2015, : 609 - 613