Two-Phase Security Protection for the Internet of Things Object
Vera Suryani, Selo Sulistyo, Widyawan Widyawan, Journal of Information Processing Systems Vol. 14, No. 6, pp. 1431-1437, Dec. 2018
10.3745/JIPS.03.0106
Keywords: Attacks, Authentication, Internet of Things, Security, Statistic
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Suryani, V., Sulistyo, S., & Widyawan, W. (2018). Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14(6), 1431-1437. DOI: 10.3745/JIPS.03.0106.
[IEEE Style]
V. Suryani, S. Sulistyo, W. Widyawan, "Two-Phase Security Protection for the Internet of Things Object," Journal of Information Processing Systems, vol. 14, no. 6, pp. 1431-1437, 2018. DOI: 10.3745/JIPS.03.0106.
[ACM Style]
Vera Suryani, Selo Sulistyo, and Widyawan Widyawan. 2018. Two-Phase Security Protection for the Internet of Things Object. Journal of Information Processing Systems, 14, 6, (2018), 1431-1437. DOI: 10.3745/JIPS.03.0106.