共 51 条
[1]
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2473-2487
[2]
Providing End-to-End Security Using Quantum Walks in IoT Networks
[J].
IEEE ACCESS,
2020, 8
:92687-92696
[5]
IoT Data Provenance Implementation Challenges
[J].
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017),
2017, 109
:1134-1139
[6]
Aman M.N., 2017, ACM IoTPTS, P11, DOI [10.1145/3055245.3055255, DOI 10.1145/3055245.3055255]
[7]
[Anonymous], 2013, P INT WORKSH AD SEC
[8]
[Anonymous], 2004, Sysbench: a system performance benchmark.
[9]
Bada A., 2019, arXiv
[10]
Smart Home Technologies: A Preliminary Review
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018),
2018,
:120-127