Dicas de Leituras – Internet das Coisas

Algumas dicas de leituras sobre Internet das Coisas

Securing the Internet of Things: A ZKP-based Approach
P Flood
Abstract Over the past few years, the Internet of Things has made significant steps towards
becoming a reality. Until now, this has been largely the widespread usage of smartphones
and tablets but further technological advancements are required before it can truly reach …

The Internet of Things: Building Trust and Maximizing Benefits Through Consumer Control
J Brill – Fordham Law Review, 2014
Abstract The Internet of Things is one of the fastest growing facets of a world that is
becoming more data intensive. Connecting cars, appliances, and even clothing to the
internet promises to deliver convenience, safety, and, through analysis of the torrent of .

Internet of Things (IoT): Present State and Future Prospects
The recent development of communication devices and wireless network technologies
continues to advance the new era of the Internet and telecommunications. The various
“things”, which include not only communication devices but also every other physical …

Toward User-Centric Feature Composition for the Internet of Things
P Zave, E Cheung, S Yarosh
Abstract—Many user studies of home automation, as the most familiar representative of the
Internet of Things, have shown the difficulty of developing technology that users understand
and like. It helps to state requirements as largely-independent features, but features are.

RFID as a key enabler of the internet of things: localization and communication
J Wang – 2014
By having everything in our physical world digitally connected, the Internet of Things is
expected to transform how we interact with our environments and unlock tremendous
business values through advance analytics. Owing to its low cost, small form factor, and its..

Security in Internet of Things using Delegation of Trust to a Provisioning Server
P Waher – 2014
Abstract. This paper proposes an architecture for open networks, such as the Internet of
Things, and describes an implemented solution that allows Things with limited or no user
interfaces to provide a high level of data security, by delegating trust to a trusted third party …