Author:
Malina Lukas,Srivastava Gautam,Dzurenda Petr,Hajny Jan,Ricci Sara
Publisher
Springer International Publishing
Reference64 articles.
1. Alpár, G., et al.: New directions in IoT privacy using attribute-based authentication: position paper (2016)
2. Atamli, A.W., Martin, A.: Threat-based security analysis for the internet of things. In: International Workshop on Secure Internet of Things, pp. 35–43. IEEE (2014)
3. Baumann, F.W., Odefey, U., Hudert, S., Falkenthal, M., Breitenbücher, U.: Utilising the tor network for IoT addressing and connectivity. In: Proceedings of the 8th International Conference on Cloud Computing and Services Science (CLOSER 2018), pp. 27–34. SciTePress, March 2018
4. Bernal Bernabe, J., Hernandez-Ramos, J.L., Skarmeta Gomez, A.F.: Holistic privacy-preserving identity management system for the internet of things. Mob. Inf. Syst. 2017, 6384186:1 (2017)
5. IFIP Advances in Information and Communication Technology;J Camenisch,2019
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献