Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/swarm/WangJJFCY23
%A hua Wang, Zhi
%A hui Jin, Ming
%A Jiang, Lin
%A jia Feng, Chen
%A yi Cao, Jing
%A Yun, Zhang
%B ICSI (2)
%D 2023
%E Tan, Ying
%E Shi, Yuhui
%E Luo, Wenjian
%I Springer
%K dblp
%P 386-399
%T Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.
%U http://dblp.uni-trier.de/db/conf/swarm/icsi2023-2.html#WangJJFCY23
%V 13969
%@ 978-3-031-36625-3
@inproceedings{conf/swarm/WangJJFCY23,
added-at = {2023-07-13T00:00:00.000+0200},
author = {hua Wang, Zhi and hui Jin, Ming and Jiang, Lin and jia Feng, Chen and yi Cao, Jing and Yun, Zhang},
biburl = {https://www.bibsonomy.org/bibtex/297b7162271908e638dab88a5cab068d2/dblp},
booktitle = {ICSI (2)},
crossref = {conf/swarm/2023-2},
editor = {Tan, Ying and Shi, Yuhui and Luo, Wenjian},
ee = {https://doi.org/10.1007/978-3-031-36625-3_31},
interhash = {5a0cb2db3b44422f46d6c740e364ca86},
intrahash = {97b7162271908e638dab88a5cab068d2},
isbn = {978-3-031-36625-3},
keywords = {dblp},
pages = {386-399},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T18:20:38.000+0200},
title = {Secure Access Method of Power Internet of Things Based on Zero Trust Architecture.},
url = {http://dblp.uni-trier.de/db/conf/swarm/icsi2023-2.html#WangJJFCY23},
volume = 13969,
year = 2023
}