ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
0
references
Top references
cited by
3
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,351
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
New Features of Authentication Scheme for the IoT
Author(s):
ting yang
,
GuangHua Zhang
,
Ling Liu
,
YiYu Yang
,
ShangRu Zhao
,
HongYu Sun
,
WenJie Wang
Publication date:
2019
Journal:
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things
Read this article at
ScienceOpen
Publisher
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Computer Vision, Deep Learning, Deep Reinforcement Learning, IoT
Author and article information
Journal
DOI::
10.1145/3338507.3358618
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,351
Self-Powered Photoelectrochemical Aptasensor for Oxytetracycline Cathodic Detection Based on a Dual Z-Scheme WO
3
/g-C
3
N
4
/MnO
2
Photoanode
Authors:
Bo Peng
,
Ziling Zhang
,
Lin Tang
…
Modeling of African population history using f -statistics can be highly biased and is not addressed by previously suggested SNP ascertainment schemes
Authors:
Pavel Flegontov
,
Ulaş Işıldak
,
Robert Maier
…
Industry Compensation under Relocation Risk: A Firm-Level Analysis of the EU Emissions Trading Scheme
Authors:
Laure B. de Preux
,
Ulrich J. Wagner
,
Ralf Martin
…
See all similar
Cited by
3
Security and privacy issues in smart cities/industries: technologies, applications, and challenges
Authors:
P. Muralidhara Rao
,
B. D. Deebak
A Features-Based Privacy Preserving Assessment Model for Authentication of Internet of Medical Things (IoMT) Devices in Healthcare
Authors:
Habib Ullah Khan
,
Yasir Ali
,
Faheem Khan
Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review
Authors:
Rahul Priyadarshi
See all cited by