4Schram A, Anderson KM. MySQL to NoSQL: data modeling challenges in supporting scalability. Proc. of the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity. ACM. 2012. 191-202. 被引量:1
5Gauravaram P. Security Analysis of saltil password Hashes. Advanced Computer Science Applications and Technologies(ACSAT), 2012 International Conference on. IEEE. 2012.25-30. 被引量:1
7Hunkeler U, Tmong HL, Stanford-Clark A. MQTT-S- A publish/subscribe protocol for wireless sensor networks. Communication Systems Software and Middleware and Workshops. Bangalore. 2008. 791-798. 被引量:1
9Lee S, Kim H, Hong D, Ju H. Correlation analysis of MQTT loss and delay according to QoS level. Information Networking (ICO1N). Bangkok. 2013.714-717. 被引量:1