Main
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
You may be interested in Powered by Rec2Me
Most frequently terms
privacy978
iot839
networks566
nodes561
node427
sensor409
devices361
ieee304
iots273
user260
vehicles255
attacks245
wireless242
mobile236
certificate205
pseudonym199
protocol166
rsu157
algorithm155
applications155
users150
malware146
aggregation138
framework133
query133
distributed133
certificates126
dynamic121
pseudonyms120
schemes118
probability118
sensors115
encryption114
vol113
entity110
consent109
processing109
architecture109
sensing108
propagation108
preserving108
hash108
consumption107
utility106
acm105
computing104
equation102
transmission100
grid93
meter93
You can write a book review and share your experiences. Other readers will always be interested in your opinion of the books you've read. Whether you've loved the book or not, if you give your honest and detailed thoughts then people will find new books that are right for them.