Ref# | Security features |
---|---|
[40] | Confidentiality, Authentication, Access Control, Availability, Authorization, Auditing, Trustworthiness, Integrity |
[64] | Authentication, Key agreement, Privacy protection, Anti DDOS, Privacy, Encryption, Platform protection, User access control |
[79] | Resilience to attacks, Confidentiality, Availability, Authentication, Auditing, Access control, Non-repudiation, Anonymity, Reply protection, Integrity, Authorization, Privacy, Trust |
[1] | Attack detection, Privacy, Confidentiality, R.R management, Secure routing |
[74] | Confidentiality, Availability, Authorization, Identification, Integrity |
[65] | Confidentiality, Availability, Integrity, Non repudiation, Continuity, Physical Security |
[60] | Confidentiality, Integrity, Availability |
[42] | Anonymity, Integrity, Availability, Non-repudiation, Authorization, Access control, Resiliency, Self-organization, Information Protection, Exception Handling |
[43] | Identification, Lightweight Protocol, Permission, Cryptography, Data protection, Communication Security, Physical protection |
[44] | Authentication, Access Control, Attack resilience, |
[58] | Non Repudiation, Intrusion Detection Contextual integrity, Authentication, Access control, Authorization, Integrity, |
[59] | Privacy, Tracking, Integrity, Authentication, Digital forgetting, Mutual trust |
[61] | Resilience to attack, Client Privacy, Authentication, Access Control |
[62] | Physical protection, User authentication, Network Monitoring, Secure key management Device authentication |
[63] | Key Management, Policies, Confidentiality, Authentication, Light weight algorithm, Heterogeneity, Integrity, Availability, |
[80] | Identity management, Resilience to attack, Data authentication, Access control, Secure data communication, Temper resistance, Availability, Secure storage, Secure content, Secure environment execution, Secure N/W Access, User identification, Client privacy |
[75] | Theft resistance, Authorization, Cloud federated authentication |
[41] | Access control, End to End security, Authorization, Authentication, |