Cited By
View all- Pinto SSantos N(2019)Demystifying Arm TrustZoneACM Computing Surveys10.1145/329104751:6(1-36)Online publication date: 28-Jan-2019
In this paper, we proposed an secure IoT framework to ensure an End-To-End security from an IoT application to IoT devices. The proposed IoT framework consists of the IoT application, an IoT broker and the IoT devices. The IoT devices can be deployed ...
In this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In ...
The emergence of internet of things (IoT) devices is challenging the conventional design targets for integrated systems such as performance, power efficiency, and cost. With the proliferation of IoT devices, ensuring safe operating margins will become ...
IEEE Press
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in