Identity-based authentication scheme for the Internet of Things
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Towards a definition of the Internet of Things ( IoT ) , 2015 .
[3] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[4] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[5] Hong Liu,et al. Study of authentication with IoT testbed , 2015, 2015 IEEE International Symposium on Technologies for Homeland Security (HST).
[6] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[7] Mohsen Guizani,et al. Software-defined networking security: pros and cons , 2015, IEEE Communications Magazine.
[8] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.
[9] Sungchul Lee,et al. Method for secure RESTful web service , 2015, 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS).
[10] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[11] Kamal Youcef-Toumi,et al. Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme , 2015, WESS.
[12] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[13] P. Balamuralidhar,et al. One time password authentication scheme based on elliptic curves for Internet of Things (IoT) , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).