An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems
暂无分享,去创建一个
Ming Lim | Shihui Wang | Liquan Chen | Sijie Qian | Liquan Chen | Ming Lim | Sijie Qian | Shih-Chen Wang
[1] Liqun Chen,et al. On the Design and Implementation of an Efficient DAA Scheme , 2010, IACR Cryptol. ePrint Arch..
[2] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[3] Liqun Chen,et al. Pairings in Trusted Computing , 2008, Pairing.
[4] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[5] Christian Wietfeld,et al. Using Public Network Infrastructures for UAV Remote Sensing in Civilian Security Operations , 2011 .
[6] Jianfeng Ma,et al. Multi-domain Direct Anonymous Attestation Scheme from Pairings , 2014, NSS.
[7] Nigel P. Smart,et al. On Computing Products of Pairings , 2006, IACR Cryptol. ePrint Arch..
[8] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[9] Calvin Coopmans,et al. Improving communication security of open source UAVs: Encrypting radio control link , 2017, 2017 International Conference on Unmanned Aircraft Systems (ICUAS).
[10] Lav Gupta,et al. Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.
[11] Jiangtao Li,et al. Simplified security notions of direct anonymous attestation and a concrete scheme from pairings , 2009, International Journal of Information Security.
[12] Stephen Oakes,et al. Security Testing of an Unmanned Aerial Vehicle (UAV) , 2016, 2016 Cybersecurity Symposium (CYBERSEC).
[13] Heiko Stamer,et al. A Software-Based Trusted Platform Module Emulator , 2008, TRUST.
[14] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[15] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[16] Xiaofeng Chen,et al. Direct Anonymous Attestation for Next Generation TPM , 2008, J. Comput..
[17] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[18] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[19] Mingtian Zhou,et al. A new process and framework for direct anonymous attestation based on symmetric bilinear maps , 2011, Wuhan University Journal of Natural Sciences.
[20] Liqun Chen,et al. A DAA Scheme Using Batch Proof and Verification , 2010, TRUST.
[21] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.