Cloud-centric multi-level authentication as a service for secure public safety device networks
暂无分享,去创建一个
Burak Kantarci | Houbing Song | Melike Erol-Kantarci | Ismail Butun | M. Erol-Kantarci | Houbing Song | B. Kantarci | I. Butun
[1] Burak Kantarci,et al. Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[2] R. Venkatesha Prasad,et al. A scalable distributed architecture towards unifying IoT applications , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[3] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[4] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[5] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[6] Burak Kantarci,et al. Towards secure cloud-centric Internet of Biometric Things , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).
[7] M. Ulema,et al. A framework for personal mobile agents in wireless pervasive computing environment , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[8] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[9] Heejo Lee,et al. An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2009, Journal of Communications and Networks.
[10] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[11] Yufeng Wang,et al. Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks , 2012, Int. J. Secur. Networks.
[12] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[13] Ragib Hasan,et al. SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.