共 26 条
[1]
Atzoria L., Ierab A., Morabito G., The Internet of Things: A survey, Journal of Computer Networks, 54, 15, pp. 2787-2805, (2010)
[2]
Weber R.H., Internet of Things-New security and privacy challenges, Journal of Computer Law & Security Review, 26, 1, pp. 23-30, (2010)
[3]
Rieback M.R., Crispo B., Tanenbaum A.S., The evolution of RFID security, Journal of IEEE Pervasive Computing, 5, 1, pp. 62-69, (2006)
[4]
Jules A., RFID security and privacy: A research survey, Journal of IEEE Selected Areas in Communications, 24, 2, pp. 381-394, (2006)
[5]
Golaup A., Mustapha M., Patanapongpibul L.B., Femtocell access control strategy in UMTS and LTE, Journal of IEEE Communications Magazine, 47, 9, pp. 117-123, (2009)
[6]
McDaniel P., McLaughlin S., Security and Privacy Challenges in the Smart Grid, Journal of IEEE Security & Privacy, 7, 3, pp. 75-77, (2009)
[7]
Anderson R.J., Security Engineering: A Guide to Building Dependable Distributed Systems, (2010)
[8]
Schapranow M.P., Zeier A., Plattner H., A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access, Proceedings of the 4th International Conference On Network and System Security (NSS), pp. 371-376, (2010)
[9]
Kopetz H., Real-time Systems: Design Principles for Distributed Embedded Applications, (2011)
[10]
Ngaia E.W.T., Moonb K.K.L., Rigginsc F.J., Yib C.Y., RFID research: An academic literature review (1995-2005) and future research directions, Journal of Production Economics, 112, 2, pp. 510-520, (2008)