Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments
暂无分享,去创建一个
[1] Avishek Adhikari,et al. An efficient multi-use multi-secret sharing scheme based on hash function , 2010, Appl. Math. Lett..
[2] Hung-Yu Chien,et al. Group Authentication with Multiple Trials and Multiple Authentications , 2017, Secur. Commun. Networks.
[3] Toshiaki Tanaka,et al. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension , 2008, ISC.
[4] Jun Shao,et al. Efficient verifiable multi-secret sharing scheme based on hash function , 2014, Inf. Sci..
[5] Feng Wang,et al. Group Authentication and Group Key Distribution for Ad Hoc Networks , 2015, Int. J. Netw. Secur..
[6] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[7] Xuemin Shen,et al. GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications , 2016, Comput. Networks.
[8] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[9] Hiroshi Doi,et al. ({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants , 2016, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS).
[10] Joon Heo,et al. Device authentication protocol for smart grid systems using homomorphic hash , 2012, Journal of Communications and Networks.
[11] Liqun Chen,et al. Efficient, XOR-Based, Ideal (t, n)- threshold Schemes , 2016, CANS.
[12] YoHan Park,et al. A Selective Group Authentication Scheme for IoT-Based Medical Information System , 2017, Journal of Medical Systems.
[13] Mehmet Karaköse,et al. A Cyberphysical System Based Mass-Customization Approach with Integration of Industry 4.0 and Smart City , 2017, Wirel. Commun. Mob. Comput..
[14] Hong Wang,et al. EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications , 2013, Int. J. Distributed Sens. Networks.
[15] Neetesh Saxena,et al. Secure and privacy-preserving concentration of metering data in AMI networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[16] Wei-Tsung Su,et al. A survey of performance improvement by group-based authentication in IoT , 2016, 2016 International Conference on Applied System Innovation (ICASI).
[17] Feifei Gao,et al. Efficient and Autonomous Energy Management Techniques for the Future Smart Homes , 2017, IEEE Transactions on Smart Grid.
[18] Neetesh Saxena,et al. Integrated Distributed Authentication Protocol for Smart Grid Communications , 2018, IEEE Systems Journal.
[19] Abdelrahaman Aly,et al. A Secure and Privacy-Preserving Protocol for Smart Metering Operational Data Collection , 2018, IEEE Transactions on Smart Grid.
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] Imrich Chlamtac,et al. Smart Meter Data Privacy: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[22] Jui-Tang Wang,et al. Group-Based Authentication and Key Agreement , 2012, Wirel. Pers. Commun..
[23] Jheng-Jia Huang,et al. Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments , 2016, MobiQuitous.
[24] Chakravarthy Bhagvati,et al. CRT Based Threshold Multi Secret Sharing Scheme , 2014, Int. J. Netw. Secur..
[25] Ron Steinfeld,et al. Lattice-based threshold-changeability for standard CRT secret-sharing schemes , 2006, Finite Fields Their Appl..