期刊文献+

物联网关键技术研究

Research on Key Technologies of Internet of Things
下载PDF
导出
摘要 物联网诞生以其关键技术的开发研究也取得重大突破,探索物联网发展的方向,结合物联网关键技术的现状、发展和未来研究物联网产业的发展趋向,以确保我们能一直走在物联网领域的前沿,推动物联网环境下其他产业、科技的发展。 The emergence of the Internet of Things has also made significant breakthroughs in the development and research of its key technologies.It explores the direction of the development of the Internet of Things,and studies the development trend of the Internet of Things industry in the light of the current situation,development and future of the key technologies of the Internet of Things,so as to ensure that we can always be at the forefront of the field of the Internet of Things and promote other products in the Development of industry and science and technology.
作者 张健 吴振鹏 ZHANG Jian;WU Zhen-peng(Armed Police Liaoning Provincial Corps Staff General Information Security Center Information Operation and MaintenanceOffice,Shenyang Liaoning 110034)
出处 《数字技术与应用》 2019年第8期105-105,107,共2页 Digital Technology & Application
关键词 物联网 感知与标识技术 信息传输与人工智能 信息安全技术 Internet of Things perception and identification technology information transmission and artificial intelligence information securitytechnology
  • 相关文献

参考文献4

二级参考文献28

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部