Secure lightweight ECC-based protocol for multi-agent IoT systems
暂无分享,去创建一个
Yousof Al-Hammadi | Mahmoud Al-Qutayri | Chan Yeob Yeun | Haya R. Hasan | Mohamed Jamal Zemerly | Tasneem Salah | Dina Shehada | Haya Hasan | Yousof Al-Hammadi | C. Yeun | M. Al-Qutayri | D. Shehada | M. Zemerly | Tasneem Salah
[1] Daniel Hagimont,et al. Evaluation of the Mobile Agents Technology: Comparison with the Client/Server Paradigm , 1999 .
[2] Devesh C. Jinwala,et al. A Comparative Analysis of Tools for Verification of Security Protocols , 2010, Int. J. Commun. Netw. Syst. Sci..
[3] Giancarlo Fortino,et al. Autonomic and Cognitive Architectures for the Internet of Things , 2015, IDCS.
[4] Vineet Sahula,et al. Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[5] Kwangjo Kim,et al. Enhancements of authenticated multiple key exchange protocol based on bilinear pairings , 2010, Comput. Electr. Eng..
[6] Jukka Riekki,et al. Mobile Agents-Based Smart Objects for the Internet of Things , 2014, Internet of Things Based on Smart Objects, Technology, Middleware and Applications.
[7] Ig Ibert Bittencourt,et al. A survey of security in multi-agent systems , 2012, Expert Syst. Appl..
[8] Giancarlo Fortino,et al. Middlewares for Smart Objects and Smart Environments: Overview and Comparison , 2014, Internet of Things Based on Smart Objects, Technology, Middleware and Applications.
[9] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[10] Mohamed Jamal Zemerly,et al. A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things , 2014 .
[11] Haifeng Li,et al. Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment , 2017, J. Inf. Hiding Multim. Signal Process..
[12] W. Marsden. I and J , 2012 .
[13] Erik P. de Vink,et al. Injective synchronisation: An extension of the authentication hierarchy , 2006, Theor. Comput. Sci..
[14] Chan Yeob Yeun,et al. A framework for comparison of trust models for multi agent systems , 2015, 2015 International Conference on Information and Communication Technology Research (ICTRC).
[15] Mohamed Jamal Zemerly,et al. Security and privacy framework for ubiquitous healthcare IoT devices , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[16] Zhiqi Shen,et al. From Internet of Things to Internet of Agents , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[17] Guy Pujolle,et al. An online security protocol for NFC payment: Formally analyzed by the scyther tool , 2016, 2016 Second International Conference on Mobile and Secure Services (MobiSecServ).
[18] Yousof Al-Hammadi,et al. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications , 2017, Secur. Commun. Networks.
[19] Wilmuth Müller,et al. Evaluating the security of mobile agent platforms , 2009, Autonomous Agents and Multi-Agent Systems.
[20] Andreas Prinz,et al. Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther , 2016, 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP).
[21] Mahmoud Al-Qutayri,et al. A secure mobile agent protocol for vehicular communication systems , 2015, 2015 11th International Conference on Innovations in Information Technology (IIT).
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] Juan Carlos Augusto,et al. Handbook of Ambient Intelligence and Smart Environments , 2009 .
[24] Munindar P. Singh,et al. Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..
[25] Kwangjo Kim,et al. Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..
[26] Mohamed Jamal Zemerly,et al. A new lightweight hybrid cryptographic algorithm for the internet of things , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[27] M. J. Zemerly,et al. Distributed lightweight Kerberos protocol for Mobile Agent Systems , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).
[28] Fatma Kahri,et al. Implementation of elliptic curve digital signature algorithm (ECDSA) , 2014, 2014 Global Summit on Computer & Information Technology (GSCIT).
[29] Wen-Chung Kuo,et al. An efficient and secure anonymous mobility network authentication scheme , 2014, J. Inf. Secur. Appl..