A New Distributed MIKEY Mode to Secure e-Health Applications
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .
[3] Azeddine Bilami,et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things , 2015, Comput. Networks.
[4] Dieter Hayn,et al. The Internet of Things for Ambient Assisted Living , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[5] Thiemo Voigt,et al. Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .
[6] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[7] Djamel Tandjaoui,et al. An end-to-end secure key management protocol for e-health applications , 2015, Comput. Electr. Eng..
[8] Yannick Chevalier,et al. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols , 2004 .
[9] Klaus Wehrle,et al. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[10] Imed Romdhani,et al. Architecting the Internet of Things: State of the Art , 2016 .
[11] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[12] David Cooper,et al. Server-Based Certificate Validation Protocol (SCVP) , 2007, RFC.
[13] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[14] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[15] Jari Arkko,et al. MIKEY: Multimedia Internet KEYing , 2004, RFC.
[16] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[17] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[18] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[19] Adam Dunkels,et al. A database in every sensor , 2011, SenSys.
[20] Pascal Thubert,et al. Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.
[21] Alexis Olivereau,et al. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things , 2012, Third International Conference on Communications and Networking.
[22] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[23] Muthu Ramachandran,et al. Towards Achieving Data Security with the Cloud Computing Adoption Framework , 2016, IEEE Transactions on Services Computing.