Study and analysis of key generation techniques in internet of things
暂无分享,去创建一个
[1] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[2] NavimipourNima Jafari,et al. Data aggregation mechanisms in the Internet of things , 2017 .
[3] Kim-Kwang Raymond Choo,et al. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts , 2017, IEEE Access.
[4] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[5] Vijander Singh,et al. An enhanced quantum key distribution protocol for security authentication , 2019, Journal of Discrete Mathematical Sciences and Cryptography.
[6] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[7] Nima Jafari Navimipour,et al. Intrusion detection systems in the Internet of things: A comprehensive investigation , 2019, Comput. Networks.
[8] Victor I. Chang,et al. Distributed behavior model orchestration in cognitive internet of things solution , 2016, Enterp. Inf. Syst..
[9] Vijander Singh,et al. An improved quantum key distribution protocol for verification , 2019, Journal of Discrete Mathematical Sciences and Cryptography.
[10] Tie Qiu,et al. Self-organizing and smart protocols for heterogeneous ad hoc networks in the Internet of Things , 2017, Ad hoc networks.
[11] Engin Leloglu. A Review of Security Concerns in Internet of Things , 2017 .
[12] Klaus Wehrle,et al. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[13] Mamta Agiwal,et al. Towards Connected Living: 5G Enabled Internet of Things (IoT) , 2019 .
[14] Wade Trappe,et al. A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.
[15] Haider Abbas,et al. Internet of things (IoT) design considerations for developers and manufacturers , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[16] Vijay Kumar Jha,et al. Secure key-distribution in IoT cloud networks , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).
[17] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[18] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[19] Nima Jafari Navimipour,et al. Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research , 2017, J. Netw. Comput. Appl..