IoT security: advances in authentication
"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it...
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ, USA ; Chichester, West Sussex, UK
Wiley
2020
|
Schlagworte: | |
Online-Zugang: | FHA01 FHD01 TUM01 UBY01 Volltext |
Zusammenfassung: | "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- |
Beschreibung: | 1 Online-Ressource (xxix, 285 Seiten) Illustrationen |
ISBN: | 9781119527947 1119527945 9781119527961 1119527961 9781119527978 111952797X |
DOI: | 10.1002/9781119527978 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046430139 | ||
003 | DE-604 | ||
005 | 20240416 | ||
007 | cr|uuu---uuuuu | ||
008 | 200218s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781119527947 |9 978-1-119-52794-7 | ||
020 | |a 1119527945 |9 1-119-52794-5 | ||
020 | |a 9781119527961 |9 978-1-119-52796-1 | ||
020 | |a 1119527961 |9 1-119-52796-1 | ||
020 | |a 9781119527978 |c Online |9 978-1-119-52797-8 | ||
020 | |a 111952797X |9 1-119-52797-X | ||
024 | 7 | |a 10.1002/9781119527978 |2 doi | |
035 | |a (OCoLC)1142760504 | ||
035 | |a (DE-599)BVBBV046430139 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1050 |a DE-91G |a DE-Aug4 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 614f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a IoT security |b advances in authentication |c edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland) |
246 | 1 | 3 | |a Internet of things security |
264 | 1 | |a Hoboken, NJ, USA ; Chichester, West Sussex, UK |b Wiley |c 2020 | |
300 | |a 1 Online-Ressource (xxix, 285 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet der Dinge |0 (DE-588)7713781-4 |2 gnd |9 rswk-swf |
653 | 0 | |a Internet of things / Security measures | |
653 | 6 | |a Electronic books | |
689 | 0 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet der Dinge |0 (DE-588)7713781-4 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Liyanage, Madhusanka |0 (DE-588)1079301984 |4 edt | |
700 | 1 | |a Braeken, An |d 1970- |4 edt | |
700 | 1 | |a Kumar, Pardeep |d 1976- |4 edt | |
700 | 1 | |a Ylianttila, Mika |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-119-52792-3 |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119527978 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031842394 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=5988985 |l FHD01 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978 |l TUM01 |p ZDB-35-WIC |q TUM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119527978 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180981150646272 |
---|---|
any_adam_object | |
author2 | Liyanage, Madhusanka Braeken, An 1970- Kumar, Pardeep 1976- Ylianttila, Mika |
author2_role | edt edt edt edt |
author2_variant | m l ml a b ab p k pk m y my |
author_GND | (DE-588)1079301984 |
author_facet | Liyanage, Madhusanka Braeken, An 1970- Kumar, Pardeep 1976- Ylianttila, Mika |
building | Verbundindex |
bvnumber | BV046430139 |
classification_rvk | ST 276 |
classification_tum | DAT 614f DAT 461f |
collection | ZDB-35-WIC ZDB-30-PQE |
ctrlnum | (OCoLC)1142760504 (DE-599)BVBBV046430139 |
discipline | Informatik |
doi_str_mv | 10.1002/9781119527978 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04533nmm a2200673 c 4500</leader><controlfield tag="001">BV046430139</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240416 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200218s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527947</subfield><subfield code="9">978-1-119-52794-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119527945</subfield><subfield code="9">1-119-52794-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527961</subfield><subfield code="9">978-1-119-52796-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119527961</subfield><subfield code="9">1-119-52796-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119527978</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-52797-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111952797X</subfield><subfield code="9">1-119-52797-X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119527978</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1142760504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046430139</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 614f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IoT security</subfield><subfield code="b">advances in authentication</subfield><subfield code="c">edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Internet of things security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ, USA ; Chichester, West Sussex, UK</subfield><subfield code="b">Wiley</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxix, 285 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet of things / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet der Dinge</subfield><subfield code="0">(DE-588)7713781-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liyanage, Madhusanka</subfield><subfield code="0">(DE-588)1079301984</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Braeken, An</subfield><subfield code="d">1970-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Pardeep</subfield><subfield code="d">1976-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ylianttila, Mika</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-119-52792-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119527978</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031842394</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=5988985</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119527978</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046430139 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:44:23Z |
institution | BVB |
isbn | 9781119527947 1119527945 9781119527961 1119527961 9781119527978 111952797X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031842394 |
oclc_num | 1142760504 |
open_access_boolean | |
owner | DE-706 DE-1050 DE-91G DE-BY-TUM DE-Aug4 |
owner_facet | DE-706 DE-1050 DE-91G DE-BY-TUM DE-Aug4 |
physical | 1 Online-Ressource (xxix, 285 Seiten) Illustrationen |
psigel | ZDB-35-WIC ZDB-30-PQE ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-30-PQE FHD01_PQE_Kauf ZDB-35-WIC TUM_Einzelkauf ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley |
record_format | marc |
spelling | IoT security advances in authentication edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland) Internet of things security Hoboken, NJ, USA ; Chichester, West Sussex, UK Wiley 2020 1 Online-Ressource (xxix, 285 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet der Dinge (DE-588)7713781-4 gnd rswk-swf Internet of things / Security measures Electronic books Internet der Dinge (DE-588)7713781-4 s Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s Authentifikation (DE-588)4330656-1 s 1\p DE-604 Liyanage, Madhusanka (DE-588)1079301984 edt Braeken, An 1970- edt Kumar, Pardeep 1976- edt Ylianttila, Mika edt Erscheint auch als Druck-Ausgabe, Hardcover 978-1-119-52792-3 https://doi.org/10.1002/9781119527978 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | IoT security advances in authentication Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet der Dinge (DE-588)7713781-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4274324-2 (DE-588)7713781-4 |
title | IoT security advances in authentication |
title_alt | Internet of things security |
title_auth | IoT security advances in authentication |
title_exact_search | IoT security advances in authentication |
title_full | IoT security advances in authentication edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland) |
title_fullStr | IoT security advances in authentication edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland) |
title_full_unstemmed | IoT security advances in authentication edited by Madhusanka Liyanage (School of Computer Science, University College, Ireland, Centre for Wireless Communication, University of Oulu, Finland), An Braeken (Industrial Engineering, Vrije Universiteit Brussel, Belgium), Pardeep Kumar (Department of Computer Science, Swansea University, UK), Mika Yliantilla, (Centre for Wireless Communication, University of Oulu, Finland) |
title_short | IoT security |
title_sort | iot security advances in authentication |
title_sub | advances in authentication |
topic | Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Computersicherheit (DE-588)4274324-2 gnd Internet der Dinge (DE-588)7713781-4 gnd |
topic_facet | Datensicherung Authentifikation Computersicherheit Internet der Dinge |
url | https://doi.org/10.1002/9781119527978 |
work_keys_str_mv | AT liyanagemadhusanka iotsecurityadvancesinauthentication AT braekenan iotsecurityadvancesinauthentication AT kumarpardeep iotsecurityadvancesinauthentication AT ylianttilamika iotsecurityadvancesinauthentication AT liyanagemadhusanka internetofthingssecurity AT braekenan internetofthingssecurity AT kumarpardeep internetofthingssecurity AT ylianttilamika internetofthingssecurity |