您当前的位置:
首页 >
文章列表页 >
Research of authentication techniques for the Internet of things
Correspondences | 更新时间:2024-06-05
    • Research of authentication techniques for the Internet of things

    • Journal on Communications   Vol. 41, Issue 7, Pages: 213-222(2020)
    • DOI:10.11959/j.issn.1000-436x.2020131    

      CLC: TP309,TP311.13
    • Online First:2020-07

      Published:25 July 2020

    移动端阅览

  • Hongqiang YAN, Linjie WANG. Research of authentication techniques for the Internet of things[J]. Journal on Communications, 2020, 41(7): 213-222. DOI: 10.11959/j.issn.1000-436x.2020131.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

3982

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Verifiable secure image retrieval for cloud-assisted IoT environments
Research on distributed network intrusion detection system for IoT based on honeyfarm
Joint resource configuration method for secure fog computing Internet of things
Semantic representation and interval roughness analysis of IoT CapBAC rules
Survey of IoT security research: threats, detection and defense

Related Author

DUAN Zhenhua
TIAN Cong
WANG Wensheng
MA Zhi
GUO Jiaqi
Hao WU
Jiajia HAO
Yunlong LU

Related Institution

School of Computer Science and Technology, Xidian University
State Key Laboratory of Advanced Rail Autonomous Operation
School of Electronic and Information Engineering, Beijing Jiaotong University
College of Intelligent Systems Science and Engineering, Harbin Engineering University
College of Information and Communication Engineering, Harbin Engineering University
0