Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems
暂无分享,去创建一个
[1] Sheng Chen,et al. Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays , 2018, IEEE Transactions on Wireless Communications.
[2] Rajappa Muthaiah,et al. Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems , 2015, Multimedia Tools and Applications.
[3] Liping Zhang,et al. Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol , 2017, Wirel. Networks.
[4] Narendra S. Chaudhari,et al. Efficient and secure modified cocktail-AKA protocol for UMTS network , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).
[5] Kim-Kwang Raymond Choo,et al. Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.
[6] Fadi Al-Turjman,et al. Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.
[7] Liping Zhang,et al. An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks , 2016, J. Netw. Comput. Appl..
[8] Yan Chen,et al. RiskCog: Unobtrusive Real-Time User Authentication on Mobile Devices in the Wild , 2020, IEEE Transactions on Mobile Computing.
[9] P. Zanaboni,et al. General practitioners’ perceptions towards the use of digital health services for citizens in primary care: a qualitative interview study , 2019, BMJ Open.
[10] Neetesh Saxena,et al. Secure-AKA: An Efficient AKA Protocol for UMTS Networks , 2014, Wirel. Pers. Commun..
[11] Mahmoud Ahmadian-Attari,et al. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards , 2016, Int. J. Commun. Syst..
[12] Deebak Bakkiam David. Mutual authentication scheme for multimedia medical information systems , 2017 .
[13] Mostafa Zaman Chowdhury,et al. The Role of Optical Wireless Communication Technologies in 5G/6G and IoT Solutions: Prospects, Directions, and Challenges , 2019, Applied Sciences.
[14] Oluwarotimi Williams Samuel,et al. A joint resource-aware and medical data security framework for wearable healthcare systems , 2019, Future Gener. Comput. Syst..
[15] Uzma Mustafa,et al. Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key Exchange , 2019, 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3).
[16] Jia Lun Tsai. Efficient Nonce-based Authentication Scheme for Session Initiation Protocol , 2009, Int. J. Netw. Secur..
[17] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..
[18] Lixiang Li,et al. An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography , 2015, Multimedia Tools and Applications.
[19] Mohammad Sabzinejad Farash. Security analysis and enhancements of an improved authentication for session initiation protocol with provable security , 2016, Peer Peer Netw. Appl..
[20] Yuguang Fang,et al. Security analysis and enhancements of 3GPP authentication and key agreement protocol , 2005, IEEE Trans. Wirel. Commun..
[21] Youliang Tian,et al. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications , 2019, Inf. Sci..
[22] Hung-Min Sun,et al. EFFICIENT AUTHENTICATION AND KEY AGREEMENT PROCEDURE IN IP MULTIMEDIA SUBSYSTEM FOR UMTS , 2011 .
[23] Ilias Politis,et al. On Security Against Pollution Attacks in Network Coding Enabled 5G Networks , 2020, IEEE Access.
[24] Debiao He. Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications , 2011, IACR Cryptol. ePrint Arch..
[25] Peng Zhang,et al. Flexible data access control in D2D communications , 2017, Future Gener. Comput. Syst..
[26] Naveen K. Chilamkurti,et al. An improved authentication protocol for session initiation protocol using smart card , 2015, Peer Peer Netw. Appl..
[27] Frederick O. Edeko,et al. Empirical investigation on the dependence of TCP upstream throughput on SNR in an IEEE802.11b WLAN system , 2014, 2014 21st International Conference on Telecommunications (ICT).
[28] Zhihua Cai,et al. Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card , 2014, Int. J. Commun. Syst..
[29] B. D. Deebak,et al. Analyzing the mutual authenticated session key in IP multimedia server-client systems for 4G networks , 2016 .
[30] Nassar Ikram,et al. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol , 2011, Multimedia Tools and Applications.
[31] Sudeep Tanwar,et al. An exhaustive survey on security and privacy issues in Healthcare 4.0 , 2020, Comput. Commun..
[32] Ruhul Amin,et al. A robust mutual authentication scheme for session initiation protocol with key establishment , 2018, Peer Peer Netw. Appl..
[33] Mohamed Abid,et al. A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).
[34] Masahiro Mambo,et al. The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[35] Morteza Nikooghadam,et al. Perfect forward secrecy in VoIP networks through design a lightweight and secure authenticated communication scheme , 2018, Multimedia Tools and Applications.
[36] Muhammad Khurram Khan,et al. An enhanced privacy preserving remote user authentication scheme with provable security , 2015, Secur. Commun. Networks.
[37] Jianfeng Ma,et al. Cryptanalysis of smart‐card‐based password authenticated key agreement protocol for session initiation protocol of Zhang et al. , 2015, Int. J. Commun. Syst..
[38] Bakkiam David Deebak. Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems , 2016, Wirel. Pers. Commun..
[39] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[40] Yucong Duan,et al. Transformation-based processing of typed resources for multimedia sources in the IoT environment , 2019, Wireless Networks.
[41] Chung-Ming Huang,et al. Authentication and key agreement protocol for UMTS with low bandwidth consumption , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[42] Hsiao-Hwa Chen,et al. A secure and efficient SIP authentication scheme for converged VoIP networks , 2010, Comput. Commun..
[43] Aiqing Zhang,et al. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.
[44] Sheetal Kalra,et al. Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things , 2019, Multimedia Tools and Applications.
[45] Vanga Odelu,et al. Enhanced Session Initiation Protocols for Emergency Healthcare Applications , 2018, SSCC.
[46] Xiaohong Jiang,et al. Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective , 2018, IEEE Transactions on Communications.
[47] Fadi Al-Turjman,et al. Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things , 2021, IEEE Journal on Selected Areas in Communications.
[48] Mariya Ouaissa,et al. A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks , 2018 .
[49] Chang,et al. Light-Weighted Password-Based Multi-Group Authenticated Key Agreement for Wireless Sensor Networks , 2019, Applied Sciences.
[50] B. D. Deebak,et al. A Secure-Ware System for Web Server: Ensuring Platform Interoperability, Security, Privacy, Usability and Functionality , 2017 .
[51] Omar Hayat,et al. Device Discovery in D2D Communication: A Survey , 2019, IEEE Access.
[52] Lingyang Song,et al. D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System , 2016, IEEE Transactions on Wireless Communications.
[53] J. Katsoulis,et al. Computer-assisted, template-guided immediate implant placement and loading in the mandible: a case report , 2019, BMC oral health.
[54] Jian Wang,et al. Secure SIP authentication scheme supporting lawful interception , 2013, Secur. Commun. Networks.
[55] Ibrahim Sogukpinar,et al. SIP Authentication Scheme using ECDH , 2007 .
[56] F. Richard Yu,et al. Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.
[57] Deepak Puthal,et al. PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things , 2020, IEEE Internet of Things Journal.
[58] Rosdiadee Nordin,et al. A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks , 2016, J. Netw. Comput. Appl..
[59] Haleh Amintoosi,et al. A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol , 2019, Secur. Priv..
[60] Eli Upfal,et al. Building low-diameter peer-to-peer networks , 2003, IEEE J. Sel. Areas Commun..
[61] Min-Shiang Hwang,et al. A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS , 2010 .
[62] Morteza Nikooghadam,et al. Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol , 2015, The Journal of Supercomputing.
[63] Sherali Zeadally,et al. A Survey of Device-to-Device Communications: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.
[64] Caixue Zhou. Comments on “Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems” , 2018, IEEE Transactions on Information Forensics and Security.
[65] Luca Deri,et al. Effective traffic measurement using ntop , 2000 .
[66] Saru Kumari,et al. An improved lightweight multiserver authentication scheme , 2017, Int. J. Commun. Syst..
[67] Hung-Yu Wei,et al. Further Enhanced Multimedia Broadcast/Multicast Service in LTE-Advanced Pro , 2019, IEEE Communications Standards Magazine.
[68] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[69] Angela Orebaugh,et al. Wireshark & Ethereal Network Protocol Analyzer Toolkit , 2007 .
[70] Guoai Xu,et al. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy , 2018, PloS one.
[71] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[72] Deebak Bakkiam David. Analyzing Traffic Models Using IP Multimedia Server–Client Systems for Consumer Wireless Multimedia System Devices , 2018 .
[73] Qi Li,et al. D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption , 2018, IEEE Access.
[74] Fadi Al-Turjman,et al. Seamless secure anonymous authentication for cloud-based mobile edge computing , 2020, Comput. Electr. Eng..
[75] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[76] Dariush Abbasinezhad-Mood,et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..
[77] Mohsen Guizani,et al. 5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.