Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems
暂无分享,去创建一个
[1] Lixiang Li,et al. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography , 2015, Multimedia Tools and Applications.
[2] Jun Li,et al. Enabling Multi-Carrier Relay Selection by Sensing Fusion and Cascaded ANN for Intelligent Vehicular Communications , 2020 .
[3] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[4] Ibrar Yaqoob,et al. Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.
[5] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[6] Jacques Bou Abdo. Authentication proxy as a service , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).
[7] Shahid Mumtaz,et al. Securing Cognitive Radio Networks using blockchains , 2020, Future Gener. Comput. Syst..
[8] Qi Xie,et al. Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model , 2017, IEEE Transactions on Information Forensics and Security.
[9] Fadi Al-Turjman,et al. IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging , 2020, Future Gener. Comput. Syst..
[10] Sandip Ray,et al. The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.
[11] Jang-Eui Hong,et al. Failure Detection and Prevention for Cyber-Physical Systems Using Ontology-Based Knowledge Base , 2018, Comput..
[12] Samiran Chattopadhyay,et al. An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments , 2020, Sensors.
[13] L. Javier García-Villalba,et al. Distributed Data Service for Data Management in Internet of Things Middleware , 2017, Sensors.
[14] Mohammad Hayajneh,et al. Data Management for the Internet of Things: Design Primitives and Solution , 2013, Sensors.
[15] Jürgen Schmidhuber,et al. Deep learning in neural networks: An overview , 2014, Neural Networks.
[16] Ramin Yahyapour,et al. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).
[17] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[18] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[19] Wei Shen,et al. An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing , 2019, Wirel. Commun. Mob. Comput..
[20] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.