Energy efficient integrated authentication and access control mechanisms for Internet of Things
暂无分享,去创建一个
[1] Elliot K. Kolodner,et al. Scalable Computing: Practice and Experience , 2011 .
[2] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[3] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[4] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[5] Jingcheng Wang,et al. A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.
[6] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[7] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[8] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[9] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[10] Hui Shi,et al. A Communication Protocol of RFID Systems in Internet of Things , 2012 .
[11] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[12] P. Hartvigsen. The Computer for the 21st Century (1991) , 2014 .
[13] Mark Weiser. The computer for the 21st century , 1991 .
[14] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[15] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[16] Y. M. Huang,et al. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.
[17] Liangmin Wang,et al. Rapid Identification Authentication Protocol for Mobile Nodes in Internet of Things with Privacy Protection , 2012, J. Networks.
[18] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[19] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[20] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[21] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[22] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[23] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.