An efficient scheme for anonymous communication in IoT
暂无分享,去创建一个
[1] David E. Culler,et al. TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.
[2] Xiaojiang Du,et al. Towards Efficient Anonymous Communications in Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[5] Abdullah Al-Mahmud,et al. Secure Sensor Node Authentication in Wireless Sensor Networks , 2012 .
[6] Chunhua Jin,et al. Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.
[7] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[8] Colin Boyd,et al. ID-based One-pass Authenticated Key Establishment , 2008, AISC.
[9] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[10] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[11] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[12] Dijiang Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[13] Margaret Salter,et al. Fundamental Elliptic Curve Cryptography Algorithms , 2011, RFC.
[14] Abdellatif Mtibaa,et al. Hash function and Digital Signature based on elliptic curve , 2013, 14th International Conference on Sciences and Techniques of Automatic Control & Computer Engineering - STA'2013.