SFVCC: Chaotic map-based security framework for vehicular cloud computing
暂无分享,去创建一个
[1] Elif Uysal-Biyikoglu,et al. Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..
[2] Nursyarizal Mohd Nor,et al. Limitation and Solution for Healthcare Network Using RFID Technology: A Review☆ , 2013 .
[3] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[4] Yalin Chen,et al. ECC-based untraceable authentication for large-scale active-tag RFID systems , 2015, Electron. Commer. Res..
[5] Musheer Ahmad,et al. A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.
[6] Ben-Jye Chang,et al. Performance Analysis with Traffic Accident for Cooperative Active Safety Driving in VANET/ITS , 2014, Wirel. Pers. Commun..
[7] Hari Om,et al. A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC , 2017, Comput. Commun..
[8] Bidi Ying,et al. Anonymous and Lightweight Authentication for Secure Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.
[9] Subhas C. Misra,et al. An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..
[10] Yining Liu,et al. A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.
[11] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[12] Y. Zhang,et al. Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..
[13] Musheer Ahmad,et al. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.
[14] ParkJong Hyuk,et al. A survey on cloud computing security , 2016 .
[15] Cheng-Chi Lee,et al. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.
[16] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[17] R. C. Mittal,et al. A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.
[18] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[19] Jianfeng Ma,et al. Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing , 2018, IEEE Network.
[20] Rakesh Kumar,et al. A Framework For Handling Local Broadcast Storm Using Probabilistic Data Aggregation In VANET , 2013, Wirel. Pers. Commun..
[21] Arun Kumar Sangaiah,et al. Secure CLS and CL-AS schemes designed for VANETs , 2019, The Journal of Supercomputing.
[22] Jian Shen,et al. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.
[23] Gaetano Marrocco,et al. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.
[24] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[25] Nei Kato,et al. A Deep-Learning-Based Radio Resource Assignment Technique for 5G Ultra Dense Networks , 2018, IEEE Network.
[26] Xinyi Huang,et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services , 2017, Future Gener. Comput. Syst..
[27] Muhammad Khurram Khan,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..
[28] W. B. Lee,et al. Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.
[29] Chih-Shun Hsu,et al. An IP passing protocol for vehicular ad hoc networks with network fragmentation , 2012, Comput. Math. Appl..
[30] Pablo Pavón-Mariño,et al. Simulation scalability issues in wireless sensor networks , 2006, IEEE Communications Magazine.
[31] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[32] Jian Shen,et al. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..
[33] Ruhul Amin,et al. Design of authentication protocol for wireless sensor network-based smart vehicular system , 2017, Veh. Commun..
[34] Stephan Olariu,et al. Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..
[35] Imran Memon,et al. Efficient User Based Authentication Protocol for Location Based Services Discovery Over Road Networks , 2017, Wirel. Pers. Commun..
[36] H. T. Mouftah,et al. Privacy preserving broadcast message authentication protocol for VANETs , 2013, J. Netw. Comput. Appl..