ECC Based Lightweight Secure Message Conveyance Protocol for Satellite Communication in Internet of Vehicles (IoV)
暂无分享,去创建一个
[1] Jalel Ben-Othman,et al. Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..
[2] Cheng-Chi Lee,et al. Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..
[3] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[4] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[5] Vanga Odelu,et al. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks , 2017, IEEE Access.
[6] Shahrokh Valaee,et al. Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends , 2015, AdHocNets 2015.
[7] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[8] Qiaoyan Wen,et al. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network , 2012, Comput. Commun..
[9] Gongjun Yan,et al. Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.
[10] Jian Shen,et al. Hierarchical Trust Level Evaluation for Pervasive Social Networking , 2017, IEEE Access.
[11] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[12] Ying Leng,et al. Novel design of intelligent internet-of-vehicles management system based on cloud-computing and Internet-of-Things , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[13] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[14] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[15] Naveen K. Chilamkurti,et al. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..
[16] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[17] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[18] Tao Zhang,et al. Security and Privacy in the Internet of Vehicles , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).
[19] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[20] Donghoon Lee,et al. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.
[21] Sheng Zhong,et al. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.
[22] Sherali Zeadally,et al. Internet of Vehicles: Architecture, Protocols, and Security , 2018, IEEE Internet of Things Journal.