共 63 条
- [1] Cirani S(2013)Enforcing security mechanisms in the IP based internet of things: an algorithmic overview Int. J. Sens. 6 197-226
- [2] Ferrari G(2016)Hardware implementation of Blowfish algorithm for the secure data transmission in internet of things Procedia. technol. 1 472-482
- [3] Veltri L(2014)From data clouds: enabling community-based data-centric services over the internet of things IEEE Int. Things J. 2 196-201
- [4] Suresh M(2012)Superiority of blowfish algorithm Int. J. Adv. Res. Comput. Sci. Softw. Eng. 9 289-306
- [5] Neema M(2015)A review and comparative analysis of various encryption algorithms Int. J. Secur. Appl. 3 1087-1097
- [6] Yue LH(2014)A comparative analysis on symmetric key encryption algorithms Int. J. Adv. Res. Comput. Eng. Technol. 13 48-55
- [7] Guo L(2009)Building the internet of things using RFID: the RFID ecosystem experience IEEE Internet Comput. 16 414-454
- [8] Li R(2013)Context aware computing for the Internet of Things: a survey IEEE Commun. Surv 52 97-105
- [9] Asaeda H(2014)From `smart objects’ to `social objects’: the next evolutionary step of the internet of things IEEE Commun. Mag. 1 206-215
- [10] Fang Y(2014)The cluster between internet of things and social networks: review and research challenges IEEE Internet Things J. 1 265-275