A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints
暂无分享,去创建一个
[1] Kijoon Chae,et al. Key Establishment and Management for Secure Cellular Machine-to-Machine Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[2] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[3] Tieniu Tan,et al. A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[4] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[5] Nalini Venkatasubramanian,et al. Privacy-protecting video surveillance , 2005, IS&T/SPIE Electronic Imaging.
[6] Alexis Olivereau,et al. A Distributed Approach for Secure M2M Communications , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[7] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[8] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[9] George Mastorakis,et al. Internet of Things (IoT) in 5G Mobile Technologies , 2016 .
[10] Ki-Hyung Kim,et al. SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN) , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[11] Jan Lukás,et al. Camera identification from printed images , 2008, Electronic Imaging.
[12] N. Boudriga,et al. Secret-Image Sharing for Multimedia Chaotic Encryption , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.