Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo, Widyawan Widyawan, Journal of Information Processing Systems Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Suryani, V., Sulistyo, S., & Widyawan, W. (2018). Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14(6), 1431-1437. DOI: 10.3745/JIPS.03.0106.
[IEEE Style]
V. Suryani, S. Sulistyo, W. Widyawan, "Two-Phase Security Protection for the Internet of Things Object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018. DOI: 10.3745/JIPS.03.0106.
[ACM Style]
Vera Suryani, Selo Sulistyo, and Widyawan Widyawan. 2018. Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14, 6, (2018), 1431-1437. DOI: 10.3745/JIPS.03.0106.