Securing the internet of things infrastructure – standards and techniques

Baig, Zubair A 2014, Securing the internet of things infrastructure – standards and techniques, in AISM 2014 : Proceedings of 12th Australian Information Security Management Conference, Edith Cowan University, Melbourne, Vic., pp. 75-81, doi: 10.4225/75/57b6651c343d6.

Attached Files
Name Description MIMEType Size Downloads

Title Securing the internet of things infrastructure – standards and techniques
Author(s) Baig, Zubair AORCID iD for Baig, Zubair A orcid.org/0000-0002-9245-2703
Conference name Information Security Management. Conference (12th : 2014 : Perth, W.A.)
Conference location Perth, W.A.
Conference dates 2014/12/01 - 2014/12/03
Title of proceedings AISM 2014 : Proceedings of 12th Australian Information Security Management Conference
Editor(s) [Unknown]
Publication date 2014
Series Information Security Management Conference
Start page 75
End page 81
Total pages 7
Publisher Edith Cowan University
Place of publication Melbourne, Vic.
Keyword(s) Internet of Things (IoT)
end-to-end security
resource-constrained devices
ISBN 9780729807180
Language eng
DOI 10.4225/75/57b6651c343d6
Indigenous content off
HERDC Research category E1.1 Full written paper - refereed
Persistent URL http://hdl.handle.net/10536/DRO/DU:30138763

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 21 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 11 Jun 2020, 15:41:07 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.