Login / Signup
A Step Towards Checking Security in IoT.
Chiara Bodei
Pierpaolo Degano
Gian Luigi Ferrari
Letterio Galletta
Published in:
ICE (2016)
Keyphrases
</>
security problems
key management
information security
security issues
management system
cloud computing
network security
information assurance
access control
security management
big data
statistical databases
resource constrained
computer security
security threats