Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC. Markmann, T., Schmidt, T. C., & Wählisch, M. Computer Communication Review, 45(5):603-604, 2015. Link Paper bibtex @article{journals/ccr/MarkmannSW15,
added-at = {2015-10-27T00:00:00.000+0100},
author = {Markmann, Tobias and Schmidt, Thomas C. and Wählisch, Matthias},
biburl = {http://www.bibsonomy.org/bibtex/259e683e73efa1deb505638ebfcfdf25c/dblp},
ee = {http://doi.acm.org/10.1145/2829988.2790021},
interhash = {015e9ea51546a760790a052bc0af1e80},
intrahash = {59e683e73efa1deb505638ebfcfdf25c},
journal = {Computer Communication Review},
keywords = {dblp},
number = 5,
pages = {603-604},
timestamp = {2015-10-29T11:36:31.000+0100},
title = {Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.},
url = {http://dblp.uni-trier.de/db/journals/ccr/ccr45.html#MarkmannSW15},
volume = 45,
year = 2015
}
Downloads: 0
{"_id":"c5qrLayTFEWYtJXQG","bibbaseid":"markmann-schmidt-whlisch-federatedendtoendauthenticationfortheconstrainedinternetofthingsusingibcandecc-2015","downloads":0,"creationDate":"2016-02-23T05:01:43.614Z","title":"Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.","author_short":["Markmann, T.","Schmidt, T. C.","Wählisch, M."],"year":2015,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/tobias friedrich?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2015-10-27T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Markmann"],"firstnames":["Tobias"],"suffixes":[]},{"propositions":[],"lastnames":["Schmidt"],"firstnames":["Thomas","C."],"suffixes":[]},{"propositions":[],"lastnames":["Wählisch"],"firstnames":["Matthias"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/259e683e73efa1deb505638ebfcfdf25c/dblp","ee":"http://doi.acm.org/10.1145/2829988.2790021","interhash":"015e9ea51546a760790a052bc0af1e80","intrahash":"59e683e73efa1deb505638ebfcfdf25c","journal":"Computer Communication Review","keywords":"dblp","number":"5","pages":"603-604","timestamp":"2015-10-29T11:36:31.000+0100","title":"Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.","url":"http://dblp.uni-trier.de/db/journals/ccr/ccr45.html#MarkmannSW15","volume":"45","year":"2015","bibtex":"@article{journals/ccr/MarkmannSW15,\n added-at = {2015-10-27T00:00:00.000+0100},\n author = {Markmann, Tobias and Schmidt, Thomas C. and Wählisch, Matthias},\n biburl = {http://www.bibsonomy.org/bibtex/259e683e73efa1deb505638ebfcfdf25c/dblp},\n ee = {http://doi.acm.org/10.1145/2829988.2790021},\n interhash = {015e9ea51546a760790a052bc0af1e80},\n intrahash = {59e683e73efa1deb505638ebfcfdf25c},\n journal = {Computer Communication Review},\n keywords = {dblp},\n number = 5,\n pages = {603-604},\n timestamp = {2015-10-29T11:36:31.000+0100},\n title = {Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.},\n url = {http://dblp.uni-trier.de/db/journals/ccr/ccr45.html#MarkmannSW15},\n volume = 45,\n year = 2015\n}\n\n","author_short":["Markmann, T.","Schmidt, T. C.","Wählisch, M."],"key":"journals/ccr/MarkmannSW15","id":"journals/ccr/MarkmannSW15","bibbaseid":"markmann-schmidt-whlisch-federatedendtoendauthenticationfortheconstrainedinternetofthingsusingibcandecc-2015","role":"author","urls":{"Link":"http://doi.acm.org/10.1145/2829988.2790021","Paper":"http://dblp.uni-trier.de/db/journals/ccr/ccr45.html#MarkmannSW15"},"keyword":["dblp"],"downloads":0},"search_terms":["federated","end","end","authentication","constrained","internet","things","using","ibc","ecc","markmann","schmidt","wählisch"],"keywords":["dblp"],"authorIDs":[],"dataSources":["oHoup8Tse8r9DcDBh"]}