On security best practices, systematic analysis of security advice, and internet of things devices

C Bellman - 2022 - repository.library.carleton.ca
Abstract While Internet of Things (IoT) security best practices have recently attracted
considerable attention from industry and governments, academic research has highlighted …

Scalable identity and key management for publish-subscribe protocols in the Internet-of-Things

P Anantharaman, K Palani, S Smith - Proceedings of the 9th …, 2019 - dl.acm.org
Publish-Subscribe protocols such as the Message Queuing Telemetry Transport (MQTT)
protocol are considered scalable, lightweight, and one-size-fits-all solutions for the Internet …

A Review on Security Challenges: Cryptography and Blockchain for Internet of Things

P Prakash, Priyanka, LK Awasthi, K Kumar - International Conference on …, 2023 - Springer
In the current era of digital technology, we know the importance of security and we are
worried about the security laps in the Internet of Things (IoT) fields. There is a lot of research …

Dynamic passcodes in association with a wireless access point

SK Meredith, W Cottrill, BB Hilliard - US Patent 11,637,834, 2023 - Google Patents
(57) ABSTRACT A method includes receiving, at an access point, an access request from a
first device after an expiration of a first passcode. The access request is encrypted based on …

Towards Identity Relationship Management For Internet of Things

MM Nur - 2021 - scholar.dsu.edu
Abstract Identity and Access Management (IAM) is in the core of any information systems.
Traditional IAM systems manage users, applications, and devices within organizational …

Flexible Content Authorization Using Digital Rights Management in Cloud Computing

A Hussain - 2021 - search.proquest.com
Cloud storages are popular for storing the user's data. For the storage provider, complying
with all aspects of user privacy agreement and safeguarding the user's personal data is …

A Mobile Secure Bluetooth-Enabled Cryptographic Provider

IM da Silva Rocha - 2019 - search.proquest.com
The use of digital X509v3 public key certificates, together with different standards for secure
digital signatures are commonly adopted to establish authentication proofs between …

[인용][C] System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Y Su, J Neumann, J Wetzlich, F Thiel