Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading
暂无分享,去创建一个
[1] Agusti Solanas,et al. The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.
[2] Qun Li,et al. Achieving Distributed User Access Control in Sensor Networks , 2022 .
[3] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[4] Wenbo He,et al. A Reservation-based Smart Parking System , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[5] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[6] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[7] Xianbin Wang,et al. Security and privacy considerations for Wireless Sensor Networks in smart home environments , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Jianfeng Ma,et al. New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..
[10] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[11] Ma Jian-feng,et al. An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Gene Tsudik,et al. Secret Handshakes from CA-Oblivious Encryption , 2004, ASIACRYPT.
[14] Mohsen Guizani,et al. Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.
[15] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[16] Gene Tsudik,et al. Taming Big Brother Ambitions: More Privacy for Secret Handshakes , 2010, Privacy Enhancing Technologies.
[17] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[18] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[19] Kui Ren,et al. DP²AC: Distributed Privacy-Preserving Access Control in Sensor Networks , 2009, IEEE INFOCOM 2009.
[20] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[21] Robert H. Deng,et al. Variations of Diffie-Hellman Problem , 2003, ICICS.
[22] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[23] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[24] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.