-
1
-
2
INTERNET OF THINGS FOR ROBOTIC PROJECTS
Published 2020-09-01Subjects: “…technology of the Internet of things…”
Get full text
Article -
3
-
4
Intent driven Internet of things
Published 2019-09-01Subjects: “…intent driven Internet of things…”
Get full text
Article -
5
Survey on the search of Internet of Things
Published 2015-12-01Subjects: “…Internet of things…”
Get full text
Article -
6
Optical wireless communication and internet of things
Published 2022-09-01Subjects: Get full text
Article -
7
THE IMPACT OF INTERNET-OF-THINGS IN HIGHER EDUCATION
Published 2017-07-01Subjects: “…Internet-of-Things…”
Get full text
Article -
8
Coding technology of passive internet of things
Published 2023-09-01Subjects: “…passive internet of things;backscatter;coding…”
Get full text
Article -
9
In-Network Caching for the Green Internet of Things
Published 2021-01-01Subjects: Get full text
Article -
10
Discussion on the common sense of the Internet of things
Published 2020-12-01Subjects: Get full text
Article -
11
Blockchain technology for Internet of things: an overview
Published 2021-03-01Subjects: Get full text
Article -
12
Support of the Internet of things for energy transformation
Published 2019-03-01Subjects: Get full text
Article -
13
Discussion on the common sense of the Internet of things
Published 2020-12-01Subjects: “…information system;internet of things;industry development…”
Get full text
Article -
14
Coding technology of passive internet of things
Published 2023-09-01Subjects: “…passive internet of things…”
Get full text
Article -
15
-
16
Research of authentication techniques for the Internet of things
Published 2020-07-01“…Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.…”
Get full text
Article -
17
Who owns Internet of Thing devices?
Published 2018-11-01“…Although Internet of Things (IoT) has been recently receiving attention from the research community, undoubtedly, there still exists several privacy concerns about those devices. …”
Get full text
Article -
18
DATA CENTER REMODELING FOR THE INTERNET OF THINGS
Published 2015-05-01Subjects: Get full text
Article -
19
Innovative Applications and Security of Internet of Things
Published 2014-02-01Get full text
Article -
20
THE PROFIT OPPORTUNITIES ON THE INTERNET OF THINGS MARKET
Published 2017-06-01Subjects: “…internet of things…”
Get full text
Article