共 56 条
[31]
Matthias C, 2015, IEEE CONF COMM NETW, P577, DOI 10.1109/CNS.2015.7346871
[32]
An Overview of Privacy and Security Issues in the Internet of Things
[J].
INTERNET OF THINGS-BOOK,
2010,
:389-395
[33]
Towards a distributed platform for resource-constrained devices
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:43-51
[34]
Mohammadian M., 2009, INT J ELECT FINANCE, V3, P374
[36]
Nie T., 2010, Performance evaluation of DES and Blowfish algorithms, P1
[39]
Prasad SGR, 2016, 2016 3RD INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), P15, DOI 10.1109/IDAACS-SWS.2016.7805777
[40]
Preist C, 2005, LECT NOTES COMPUT SC, V3729, P987, DOI 10.1007/11574620_70