Electrochemical preparation system for unique mesoporous hemisphere gold nanoparticles using block copolymer micelles
暂无分享,去创建一个
W. Susilo | Neeraj Kumar | M. Wazid | A. Das | Vanga Odelu
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] James H. Burrows,et al. Secure Hash Standard , 1995 .
[3] Sheila Frankel,et al. The AES-CBC Cipher Algorithm and Its Use with IPsec , 2003, RFC.
[4] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[5] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[6] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[7] K. Takeda,et al. A Product Based Security Model for Smart Home Appliances , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[8] Kim-Kwang Raymond Choo. Key establishment : proofs and refutations , 2006 .
[9] Elisa Bertino,et al. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.
[10] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[11] Jongpil Jeong,et al. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[12] Athina Lazakidou. Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications , 2010 .
[13] Palash Sarkar,et al. A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.
[14] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[15] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[16] Hyun Jung Kim,et al. AUTHHOTP - HOTP Based Authentication Scheme over Home Network Environment , 2011, ICCSA.
[17] Kefei Chen,et al. An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[18] Jong Hyuk Park,et al. Robust one-time password authentication scheme using smart card for home network environment , 2011, Comput. Commun..
[19] Sanjay Singh,et al. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication , 2012, 2012 International Conference on Innovations in Information Technology (IIT).
[20] Daniel Mossé,et al. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.
[21] Taeshik Shon,et al. A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.
[22] Cheng-Chi Lee,et al. Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices , 2013, IET Comput. Digit. Tech..
[23] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[24] Li Xu,et al. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[25] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[26] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[27] Ashok Kumar Das,et al. A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems , 2015, Journal of Medical Systems.
[28] Yasir Saleem,et al. Network Simulator NS-2 , 2015 .
[29] David Thaler,et al. Architectural Considerations in Smart Object Networking , 2015, RFC.
[30] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[31] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[32] Xiong Li,et al. Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.
[33] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[34] Vanga Odelu,et al. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms , 2016, IEEE Transactions on Consumer Electronics.
[35] Kirti Kamthe,et al. Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices , 2017 .
[36] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[37] Athanasios V. Vasilakos,et al. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.
[38] By Ciarán Morrison. What is a ‘ Smart Home ’ ? , 2019 .