A security authentication scheme in machine-to-machine home network service
暂无分享,去创建一个
Zheng Zhou | Xuebin Sun | Shuang Men | Chenglin Zhao | Cheng-lin Zhao | Xuebin Sun | Zheng Zhou | Shuang Men
[1] Eui-nam Huh,et al. A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[2] Hyungkyu Lee,et al. The Efficient Security Architecture for Authentication and Authorization in the Home Network , 2007, Third International Conference on Natural Computation (ICNC 2007).
[3] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[4] Manik Lal Das,et al. A Simple and Secure Authentication and Key Establishment Protocol , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[5] Jongpil Jeong,et al. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[6] Jiang Du,et al. A study of information security for M2M of IOT , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[7] Yun-kyung Lee,et al. Home Network Modelling and Home Network User Authentication Mechanism using Biometric Information , 2006, 2006 IEEE International Symposium on Consumer Electronics.
[8] Hans-Joachim Hof,et al. Industrial Sensor Network Security Architecture , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[9] Chen Ming,et al. Hand Tracking Based on Particle Filter and Improved Level Set , 2010 .
[10] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.