A secure mutual authentication protocol for IoT environment
暂无分享,去创建一个
[1] Sudipta Chattopadhyay,et al. An improved authentication and security scheme for LTE/LTE-A networks , 2020, J. Ambient Intell. Humaniz. Comput..
[2] Dariush Abbasinezhad-Mood,et al. Novel Anonymous Key Establishment Protocol for Isolated Smart Meters , 2020, IEEE Transactions on Industrial Electronics.
[3] Dariush Abbasinezhad-Mood,et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..
[4] Issa Traoré,et al. Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain , 2019, J. Inf. Secur. Appl..
[5] Sudipta Chattopadhyay,et al. A modified PKM environment for the security enhancement of IEEE 802.16e , 2019, Comput. Stand. Interfaces.
[6] Shefalika Ghosh Samaddar,et al. A Robust Lightweight ECC-Based Three-Way Authentication Scheme for IoT in Cloud , 2019 .
[7] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[8] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[9] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[10] Dariush Abbasinezhad-Mood,et al. Efficient Design of a Novel ECC-Based Public Key Scheme for Medical Data Protection by Utilization of NanoPi Fire , 2018, IEEE Transactions on Reliability.
[11] Dariush Abbasinezhad-Mood,et al. Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps , 2018, IEEE Transactions on Industrial Informatics.
[12] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[13] S. Bhuvaneshwari,et al. Enhanced mutual authentication scheme for cloud of things , 2018 .
[14] Xiong Li,et al. An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[15] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[16] Chien-Ming Chen,et al. A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..
[17] Sheetal Kalra,et al. Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..
[18] Chin-Chen Chang,et al. Notes on "Secure authentication scheme for IoT and cloud servers" , 2017, Pervasive Mob. Comput..
[19] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[20] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[21] Dindayal Mahto,et al. Security Analysis of Elliptic Curve Cryptography and RSA , 2016 .
[22] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[23] Swapnoneel Roy,et al. Security Analysis of ECC Based Authentication Protocols , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).
[24] Antonio Puliafito,et al. A utility paradigm for IoT: The sensing Cloud , 2015, Pervasive Mob. Comput..
[25] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[26] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[27] Ola Angelsmark,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) Calvin – Merging Cloud and IoT , 2015 .
[28] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[29] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[30] M. Farash,et al. A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks , 2014, The Journal of Supercomputing.
[31] Ethiopia Nigussie,et al. An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.
[32] Lin Sun,et al. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications , 2015, IACR Cryptol. ePrint Arch..
[33] Kuo-Yu Tsai,et al. Two ID-based authenticated schemes with key agreement for mobile environments , 2013, Journal of Supercomputing.
[34] Almudena Alcaide,et al. Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..
[35] Haider Abbas,et al. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..
[36] Roel Peeters,et al. Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol , 2013, IACR Cryptol. ePrint Arch..
[37] G. P. Biswas,et al. A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2011, J. Syst. Softw..
[38] Suresh C. Mehrotra,et al. A Review on Elliptic Curve Cryptography for Embedded Systems , 2011, ArXiv.
[39] A. Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[40] Chin-Chen Chang,et al. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..
[41] Sebastian Wallner,et al. Secure communication in microcomputer bus systems for embedded devices , 2008, J. Syst. Archit..
[42] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[43] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[44] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).