Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security
暂无分享,去创建一个
Jianqiang Li | Qiuzhen Lin | Huihui Wang | Leo Yu Zhang | Jia Wang | Lee-Ming Cheng | Qiuzhen Lin | Jianqiang Li | Lee-Ming Cheng | L. Zhang | Jia Wang | Huihui Wang | Jian-qiang Li
[1] Sabina Jeschke,et al. Industrial Internet of Things: Cybermanufacturing Systems , 2016 .
[2] Erich Wenger,et al. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography , 2013, ACNS.
[3] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[4] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[5] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[6] Elaine B. Barker. Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .
[7] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[8] Jianqiang Li,et al. Automatic Classification of Fetal Heart Rate Based on Convolutional Neural Network , 2019, IEEE Internet of Things Journal.
[9] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[10] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[11] Shangguang Wang,et al. An overview of Internet of Vehicles , 2014, China Communications.
[12] Wenjia Li,et al. Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.
[13] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[14] Jonathan Petit,et al. Remote Attacks on Automated Vehicles Sensors : Experiments on Camera and LiDAR , 2015 .
[15] Glenn A. Fink,et al. Security and Privacy in Cyber-Physical Systems , 2017 .
[16] Hwajeong Seo,et al. On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age , 2017, IEEE Transactions on Dependable and Secure Computing.
[17] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[18] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[19] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[20] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[21] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[22] Craig Costello,et al. Selecting elliptic curves for cryptography: an efficiency and security analysis , 2016, Journal of Cryptographic Engineering.
[23] Christian Brecher,et al. Cyber-Physical Systems: Foundations, Principles and Applications , 2016 .
[24] Sabina Jeschke,et al. Smart Cities: Foundations, Principles, and Applications , 2017 .
[25] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[26] W. Marsden. I and J , 2012 .