An efficient authentication and access control scheme for perception layer of Internet of Things
暂无分享,去创建一个
[1] Satyajit Banerjee,et al. Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.
[2] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[3] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[4] Hui-Feng Huang,et al. A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.
[5] Weiping Shao,et al. An attribute and role based access control model for service-oriented environment , 2010, 2010 Chinese Control and Decision Conference.
[6] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[7] Guoping Zhang,et al. An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[8] Chunming Wu,et al. BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[9] Da-Zhi Sun,et al. On the security of an enhanced novel access control protocol for wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.
[10] E. A. Etchu. Security and Privacy in Sensor Networks , 2010 .
[11] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[12] Ei Ei Mon,et al. The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[13] Jingcheng Wang,et al. A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.
[14] Omar Cheikhrouhou,et al. An ID-based user authentication scheme for Wireless Sensor Networks using ECC , 2011, ICM 2011 Proceeding.
[15] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[16] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[17] Song Xin fang,et al. A new access control scheme based on protection of sensitive attributes , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[18] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[19] Jing Li,et al. An Authorization Management Approach in the Internet of Things , 2012 .
[20] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[21] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[22] Lizhong Jin,et al. A Novel Secure Architecture for the Internet of Things , 2011, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).