The use of Handle to aid IoT security.
Socrates VarakliotisPeter T. KirsteinGiulia DeianaPublished in: ICC (2015)
Keyphrases
- security problems
- key management
- intrusion detection
- information security
- network security
- management system
- information assurance
- security issues
- computer security
- security policies
- high security
- security mechanisms
- computer networks
- security systems
- security threats
- security requirements
- security measures
- rfid systems
- neural network
- location information
- anomaly detection
- security level
- data integrity
- resource constrained
- statistical databases