Login / Signup

On the design of security mechanisms for the Internet of Things.

Shantanu PalMichael HitchensVijay Varadharajan
Published in: ICST (2017)
Keyphrases
  • security mechanisms
  • resource constrained
  • security issues
  • databases
  • access control
  • smart card
  • database
  • case study
  • software architecture
  • security requirements