The Internet of Things, 2001. ,
Hype Cycle for the Internet of Things, Gartner Inc., Tech. Rep, 2001. ,
Securing the Internet of Things, IEEE Computer Journal, pp.51-58, 2011. ,
DOI : 10.1109/MC.2011.291
Lithe: Lightweight Secure CoAP for the Internet of Things, IEEE Sensors Journal, pp.3711-3720, 2013. ,
DOI : 10.1109/JSEN.2013.2277656
Two-way Authentication for the Internetof-Things, Internet of Things: Novel Advances and Envisioned Applications, pp.27-56, 2017. ,
DOI : 10.1007/978-3-319-53472-5_2
DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, vol.11, issue.8, pp.2710-2723, 2002. ,
DOI : 10.1016/j.adhoc.2013.05.003
Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, vol.61, issue.3, pp.527-542, 2011. ,
DOI : 10.1007/s11277-011-0385-5
URL : http://www.comsys.rwth-aachen.de/fileadmin/papers/2011/2011-heer-iot-challenges.pdf
Delegation-based authentication and authorization for the IP-based Internet of Things, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp.1-9, 2014. ,
DOI : 10.1109/SAHCN.2014.6990364
URL : http://www.vs.inf.ethz.ch/publ/papers/mshafagh_secon14.pdf
Ethernet topology discovery without network assistance, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004., pp.328-339, 2004. ,
DOI : 10.1109/ICNP.2004.1348122
URL : http://research.microsoft.com/en-us/um/people/fournet/papers/ethernet-topology-discovery-without-network-assistance-icnp04.pdf
Measuring user confidence in smartphone security and privacy, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-16, 2012. ,
DOI : 10.1145/2335356.2335358
URL : http://nma.berkeley.edu/ark:/28722/bk0012h7b36
Paranoid Android, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.347-356, 2010. ,
DOI : 10.1145/1920261.1920313