Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
暂无分享,去创建一个
Ray R. Hashemi | Amar Rasheed | Ayman Bagabas | Jeffrey Young | Chanukya Badri | Keyur Patel | Keyur K. Patel | R. Hashemi | Jeffrey Young | A. Rasheed | Ayman Bagabas | Chanukya Badri
[1] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[2] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[3] Mohammad Masdari,et al. A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems , 2017, J. Netw. Comput. Appl..
[4] Faheem Zafari,et al. Microlocation for Internet-of-Things-Equipped Smart Buildings , 2015, IEEE Internet of Things Journal.
[5] Heekuck Oh,et al. Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).
[6] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[7] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[8] P. Jonathon Phillips,et al. An Introduction to Evaluating Biometric Systems , 2000, Computer.
[9] L. Biel,et al. ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).
[10] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[11] D. Hatzinakos,et al. ECG Biometric Recognition Without Fiducial Detection , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[12] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[13] Brenda K. Wiederhold,et al. ECG to identify individuals , 2005, Pattern Recognit..
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] Attila A. Yavuz,et al. HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[16] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[17] Anders Fongen,et al. Identity Management and Integrity Protection in the Internet of Things , 2012, 2012 Third International Conference on Emerging Security Technologies.