期刊文献+

物联网关键技术与应用 被引量:3

Key Technology and Application of Internet of Things
下载PDF
导出
摘要 物联网是一场关于"物"的革命,它是由现代信息技术引起的,被大多数人认为是信息技术的第三次革命。物联网是在计算机技术和互联网技术的基础上进行提升、汇总和融合,因此,它并不是凭空出现的。笔者对物联网的关键技术和应用进行了详细的探讨。 The Internet of things is a revolution of"things",which is ca used by modern information technology.Most people think of it as the third revolution in information technology.Internet of things is based on computer technology and Internet technology.It has been promoted,aggregated and integrated.Therefore,it is not out of thin air.In this article,the key technologies and applications of the Internet of things are discussed in detail.
作者 何文静 He Wenjing(Nanchong Vocational and Technical College,Nanchong Sichuan 637000,China)
出处 《信息与电脑》 2017年第20期167-168,171,共3页 Information & Computer
关键词 物联网 无线网络技术 云计算技术 Internet of things wireless network technology cloud computing technology
  • 相关文献

参考文献5

二级参考文献33

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献102

同被引文献21

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部