Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
暂无分享,去创建一个
[1] Akhilesh Tyagi,et al. Barrel Shifter Physical Unclonable Function Based Encryption , 2018, Cryptogr..
[2] Cheng Huang,et al. Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges , 2017, IEEE Communications Magazine.
[3] Rongxing Lu,et al. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.
[4] Biplab Sikdar,et al. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones , 2020, IEEE Transactions on Vehicular Technology.
[5] Mu-En Wu,et al. A secure authenticated and key exchange scheme for fog computing , 2020, Enterp. Inf. Syst..
[6] Niall Twomey,et al. Bridging e-Health and the Internet of Things: The SPHERE Project , 2015, IEEE Intelligent Systems.
[7] Chih-Hsien Hsia,et al. VLSI implementation of an ultra-low-cost and low-power image compressor for wireless camera networks , 2018, Journal of Real-Time Image Processing.
[8] Sotiris Ioannidis,et al. Review of Security and Privacy for the Internet of Medical Things (IoMT) , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[9] Hung-Min Sun,et al. Improvement of a novel mutual authentication scheme based on quadratic residues for RFID systems , 2008, 2009 Joint Conferences on Pervasive Computing (JCPC).
[10] R. Somasundaram,et al. Review of security challenges in healthcare internet of things , 2020, Wireless Networks.
[11] Jian Shen,et al. Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing , 2018, Peer-to-Peer Netw. Appl..
[12] Chih-Hsien Hsia,et al. Finger-vein recognition based on parametric-oriented corrections , 2016, Multimedia Tools and Applications.
[13] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[14] Ashok Kumar Das,et al. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.
[15] Jiang Zhu,et al. Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.
[16] Biplab Sikdar,et al. A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process , 2020, IEEE Journal of Biomedical and Health Informatics.
[17] Kenneth H. Rosen. Elementary Number Theory: And Its Applications , 2010 .
[18] Kim-Kwang Raymond Choo,et al. Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.
[19] Tian Fu Lee,et al. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication , 2015 .
[20] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[21] Prosanta Gope,et al. LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..
[22] Klaus Doppler,et al. Advances in Device-to-Device Communications and Network Coding for IMT-Advanced , 2009 .
[23] Nan Jiang,et al. Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts , 2020, Comput. Secur..
[24] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[25] An Braeken,et al. Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model , 2019, Wireless Networks.