The security trade-offs in resource constrained nodes for IoT application
The security trade-offs in resource constrained nodes for IoT application
Harris, Nicholas
237cfdbd-86e4-4025-869c-c85136f14dfd
Weddell, Alexander
3d8c4d63-19b1-4072-a779-84d487fd6f03
Alharby, Sultan
499b9e0a-ab81-4e80-8aff-1f52ae6d2afd
Reeve, Jeff
7d68ed10-0b4b-4bc4-97a8-39431f7e3e81
22 January 2018
Harris, Nicholas
237cfdbd-86e4-4025-869c-c85136f14dfd
Weddell, Alexander
3d8c4d63-19b1-4072-a779-84d487fd6f03
Alharby, Sultan
499b9e0a-ab81-4e80-8aff-1f52ae6d2afd
Reeve, Jeff
7d68ed10-0b4b-4bc4-97a8-39431f7e3e81
Harris, Nicholas, Weddell, Alexander, Alharby, Sultan and Reeve, Jeff
(2018)
The security trade-offs in resource constrained nodes for IoT application.
20th International Conference on Wireless Communication and Sensor Networks, , Dubai, United Arab Emirates.
22 - 24 Jan 2018.
Record type:
Conference or Workshop Item
(Paper)
This record has no associated files available for download.
More information
Published date: 22 January 2018
Venue - Dates:
20th International Conference on Wireless Communication and Sensor Networks, , Dubai, United Arab Emirates, 2018-01-22 - 2018-01-24
Identifiers
Local EPrints ID: 417189
URI: http://eprints.soton.ac.uk/id/eprint/417189
PURE UUID: b8b51f37-9c67-4b19-9e7e-8eb27e07edb7
Catalogue record
Date deposited: 24 Jan 2018 17:30
Last modified: 12 Dec 2021 03:33
Export record
Contributors
Author:
Nicholas Harris
Author:
Alexander Weddell
Author:
Sultan Alharby
Author:
Jeff Reeve
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics