暂无分享,去创建一个
[1] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[2] Nitish Mehta,et al. Group authentication using paillier threshold cryptography , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).
[3] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[4] Leonardo A. Martucci,et al. A Lightweight Distributed Group Authentication Mechanism , 2004 .
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Bo Huang,et al. A Novel Group-Based Handover Authentication Scheme with Privacy Preservation for Mobile WiMAX Networks , 2012, IEEE Communications Letters.
[7] Qiang Ni,et al. Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks , 2018, IEEE Communications Magazine.
[8] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[9] Hung-Yu Chien,et al. Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.
[10] Ramjee Prasad,et al. Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT) , 2014, 2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE).
[11] Mohsen Guizani,et al. Handover authentication for mobile networks: security and efficiency aspects , 2015, IEEE Network.
[12] Varalakshmi Perumal,et al. Secure and efficient hand-over authentication in WLAN using elliptic curve RSA , 2017, Comput. Electr. Eng..