Login / Signup

Protection scheme for IoT devices using introspection.

Chulhyun KangFizza AbbasHeekuck Oh
Published in: NOF (2015)
Keyphrases
  • protection scheme
  • smart objects
  • mobile devices
  • operating system
  • cloud computing
  • sensor networks
  • information theoretic
  • wireless networks