This work is licensed under the Creative Commons Attribution 4.0 International License.
Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283–294.HassanW. H.2019Current research on Internet of Things (IoT) security: A survey148283294Search in Google Scholar
Koopman, P. (2004). Embedded system security. Computer, 37(7), 95–97.KoopmanP.2004Embedded system security3779597Search in Google Scholar
Ke, Y., Zhang, M. Q., Liu, J., Su, T. T., & Yang, X. Y. (2019). Generative steganography with Kerckhoffs’ principle. Multimedia Tools and Applications, 78(10), 13805–13818.KeY.ZhangM. Q.LiuJ.SuT. T.YangX. Y.2019Generative steganography with Kerckhoffs’ principle78101380513818Search in Google Scholar
Cui X, Zhao B, Fan P, & Xiao Y. (2017). A Key Management Mechanism Under the TrustZone Architecture (in Chinese). Journal of Shandong University (Science Edition), 52(6), 92–98.CuiXZhaoBFanPXiaoY2017A Key Management Mechanism Under the TrustZone Architecture (in Chinese)5269298Search in Google Scholar
Gao, Y., Su, Y., Yang, W., Chen, S., Nepal, S., & Ranasinghe, D. C. (2019, March). Building secure SRAM PUF key generators on resource constrained devices. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 912–917). IEEE.GaoY.SuY.YangW.ChenS.NepalS.RanasingheD. C.2019MarchIn2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)912917IEEESearch in Google Scholar
Barbareschi, M., Battista, E., Mazzeo, A., & Venkatesan, S. (2014, August). Advancing wsn physical security adopting tpm-based architectures. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) (pp. 394–399). IEEE.BarbareschiM.BattistaE.MazzeoA.VenkatesanS.2014AugustInProceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)394399IEEESearch in Google Scholar
Zhao B, Li H, Ma J, & Huang Y. (2018). Security Enhanced Key Generation Scheme Based on USB Key (in Chinese). Computer Engineering and Applications, 10.ZhaoBLiHMaJHuangY2018Security Enhanced Key Generation Scheme Based on USB Key (in Chinese)10Search in Google Scholar
Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2011). Smart card security; Technology and adoption. International Journal of Security, 5(2), 74–84.TaherdoostH.SahibuddinS.JalaliyoonN.2011Smart card security; Technology and adoption527484Search in Google Scholar
Won, Y. S., Lee, J., & Han, D. G. (2018). Side channel leakages against financial ic card of the republic of korea. Applied Sciences, 8(11), 2258.WonY. S.LeeJ.HanD. G.2018Side channel leakages against financial ic card of the republic of korea8112258Search in Google Scholar
Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22(1), 103–119.MiloslavskayaN.TolstoyA.2019Internet of Things: information security challenges and solutions221103119Search in Google Scholar
Tan K, Li Z, Guan Y, Ye L, Tong W, & Zhang B. (2019). Lightweight Key Management Solution for Electric Vehicle Charging Pile (in Chinese). power construction, 40(9), 73–81.TanKLiZGuanYYeLTongWZhangB2019Lightweight Key Management Solution for Electric Vehicle Charging Pile (in Chinese)4097381Search in Google Scholar
Yin, C., & Du, L. (2019, December). Design of Intelligent Comprehensive Security System for Existing Office Building. In IOP Conference Series: Earth and Environmental Science (Vol. 358, No. 4, p. 042001). IOP Publishing.YinC.DuL.2019DecemberInIOP Conference Series: Earth and Environmental Science3584042001IOP PublishingSearch in Google Scholar
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2021). Handbook of applied cryptography. Instructor, 202101.MenezesA. J.van OorschotP. C.VanstoneS. A.2021Search in Google Scholar
Guo, W. W., Liu, F., Tian, H., Yang, F., Zheng, S., Wang, Y.,... & Zheng, J. H. (2020, November). A Novel Intelligent Management System of Library Seat. In 2020 International Conference on Robots & Intelligent System (ICRIS) (pp. 232–235). IEEE.GuoW. W.LiuF.TianH.YangF.ZhengS.WangY.ZhengJ. H.2020NovemberIn2020 International Conference on Robots & Intelligent System (ICRIS)232235IEEESearch in Google Scholar
Alan, U. D., & Birant, D. (2018). Server-based intelligent public transportation system with NFC. IEEE Intelligent Transportation Systems Magazine, 10(1), 30–46.AlanU. D.BirantD.2018Server-based intelligent public transportation system with NFC1013046Search in Google Scholar