Securing the internet protocol
Abstract
Reference
Index Terms
- Securing the internet protocol
Recommendations
SKIP-securing the Internet
WET-ICE '96: Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)Currently, two different approaches are being pursued for securing the Internet with respect to commercial use on a broad scale. The properties of these two approaches-application-coupled security vs. network-coupled security-are discussed and compared. ...
Authentication Protocol for Securing Internet of Things
ICEMIS '18: Proceedings of the Fourth International Conference on Engineering & MIS 2018The Internet of things (IoT) is become an important research topic because it integrates various sensors and objects to communicate directly with one another object without human intervention. Today, Internet of Things has so many applications in our ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 199Total Downloads
- Downloads (Last 12 months)22
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in