Hybrid Algorithm for Data Confidentiality in Internet of Things
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Wang Chen. An IBE-based security scheme on Internet of Things , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[3] Michael J. Covington,et al. Threat implications of the Internet of Things , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[4] Yousof Al-Hammadi,et al. Secure lightweight ECC-based protocol for multi-agent IoT systems , 2017, 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[5] Harsh Durga Tiwari,et al. Novel Method for DNA‐Based Elliptic Curve Cryptography for IoT Devices , 2018, ETRI Journal.
[6] Behnam Dezfouli,et al. Analyzing the Resource Utilization of AES Encryption on IoT Devices , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).
[7] M.S. Kakkasageri,et al. Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach , 2009, 2009 International Conference on Future Computer and Communication.
[8] Xiao Feng Wang,et al. Research on Security Issues of the Internet of Things , 2014, CIT 2014.
[9] Joakim Eriksson,et al. BSD-based elliptic curve cryptography for the open Internet of Things , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[10] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[11] Kun-Lin Tsai,et al. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.
[12] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[14] Y Chandu,et al. Design and implementation of hybrid encryption for security of IOT data , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[15] Zhihua Li,et al. A Multi-layer Security Model for Internet of Things , 2012 .
[16] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[17] Guanyu Li,et al. Descriptive models for Internet of Things , 2010, 2010 International Conference on Intelligent Control and Information Processing.
[18] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[19] Mohammad Kalantari,et al. Enhancing security and confidentiality in location-based data encryption algorithms , 2011 .