Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication
暂无分享,去创建一个
Yong Gan | Xiangyang Luo | Zheng Jun | Qikun Zhang | Yongjiao Li | Zheng Chuanyang | Qikun Zhang | Xiangyang Luo | Yongjiao Li | Yong Gan | Zheng Chuanyang | Zheng Jun | Jun Zheng
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[3] Klara Nahrstedt,et al. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..
[4] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[5] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[6] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[7] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[8] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[9] Josep Domingo-Ferrer,et al. Identity-Based Authenticated Asymmetric Group Key Agreement Protocol , 2010, COCOON.
[10] Jun Shao,et al. Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol , 2012, KSII Trans. Internet Inf. Syst..
[11] Yuan,et al. Alliance-Authentication Protocol in Clouds Computing Environment , 2012 .
[12] Baocang Wang,et al. Authenticated asymmetric group key agreement based on certificateless cryptosystem , 2014, Int. J. Comput. Math..
[13] Ma,et al. An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks , 2014 .
[14] Lei Zhang,et al. Certificateless and identity-based authenticated asymmetric group key agreement , 2017, International Journal of Information Security.
[15] Jianwei Liu,et al. A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks , 2016, IEICE Trans. Inf. Syst..
[16] Mu Han,et al. A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET , 2016, KSII Trans. Internet Inf. Syst..
[17] Liehuang Zhu,et al. Cross-cluster asymmetric group key agreement for wireless sensor networks , 2018, Science China Information Sciences.
[18] Muhammad Bilal,et al. A secure key agreement protocol for dynamic group , 2017, Cluster Computing.
[19] Emin Anarim,et al. A secure and efficient group key agreement approach for mobile ad hoc networks , 2017, Ad Hoc Networks.
[20] Chun-Ta Li,et al. A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps , 2018, IEEE Access.
[21] Chien-Lung Hsu,et al. Anonymous group key agreement protocol for multi-server and mobile environments based on Chebyshev chaotic maps , 2018, The Journal of Supercomputing.
[22] Yu Zhang,et al. A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..
[23] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[24] Yu Zhang,et al. Research on QoS service composition based on coevolutionary genetic algorithm , 2018, Soft Comput..
[25] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[26] Konstantinos Markantonakis,et al. A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks , 2018, 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC).
[27] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[28] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[29] Yong Gan,et al. An Authentication Key Establish Protocol for WSNs Based on Combined Key , 2018, Wirel. Pers. Commun..
[30] Xiaojiang Du,et al. Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities , 2018, IEEE Communications Magazine.
[31] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[32] Jie Cui,et al. HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs , 2018, Veh. Commun..
[33] B. B. Gupta,et al. Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices , 2018, Int. J. E Serv. Mob. Appl..
[34] Yong Gan,et al. A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.
[35] Lu Liu,et al. An authenticated asymmetric group key agreement based on attribute encryption , 2018, J. Netw. Comput. Appl..
[36] Chen Liang,et al. An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.
[37] Xiaosong Zhang,et al. Multi-domain Lightweight Asymmetric Group Key Agreement , 2018 .
[38] Yong Chen,et al. Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs , 2018, Wirel. Commun. Mob. Comput..
[39] Brij B. Gupta,et al. Attack in Smartphone Wi-Fi Access Channel: State of the Art, Current Issues, and Challenges , 2018 .
[40] Yuanzhang Li,et al. A Specific-Targeting Asymmetric Group Key Agreement for Cloud Computing , 2018 .
[41] Chen Liang,et al. Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.
[42] Xianmin Wang,et al. Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..
[43] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[44] Yuanzhang Li,et al. A Covert Channel Over VoLTE via Adjusting Silence Periods , 2018, IEEE Access.
[45] Mohammad S. Obaidat,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..
[46] Qing Yang,et al. A Secure and Efficient Group Key Agreement Scheme for VANET , 2019, Sensors.
[47] Xiaohui Kuang,et al. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.
[48] Yuanzhang Li,et al. A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images , 2019, IEEE Access.
[49] Yue Zhang,et al. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT , 2019, J. Netw. Comput. Appl..
[50] Gaurav Sharma,et al. On the Security of Authenticated Group Key Agreement Protocols , 2019, Scalable Comput. Pract. Exp..
[51] Lu Liu,et al. A hierarchical group key agreement protocol using orientable attributes for cloud computing , 2019, Inf. Sci..
[52] Rajeev Anand Sahu,et al. A twofold group key agreement protocol for NoC-based MPSoCs , 2019, Trans. Emerg. Telecommun. Technol..