Login / Signup
How to disinfect and secure the Internet of Things.
Hongwen Zhang
Published in:
Netw. Secur. (2016)
Keyphrases
</>
cryptographic protocols
physical world
mobile devices
ubiquitous computing
security protocols
security model
case study
lightweight
big data
highly efficient
data sets
key distribution
authentication scheme
security requirements
stream cipher
key exchange
security management
database systems
databases