SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems
暂无分享,去创建一个
[1] Ioannis G. Askoxylakis,et al. XSACd - Cross-domain resource sharing & access control for smart environments , 2018, Future Gener. Comput. Syst..
[2] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[3] Ian T. Downard,et al. Simulating Sensor Networks in NS-2 , 2004 .
[4] Li Wei,et al. Key Management Protocol for WSN Based on ECC , 2010 .
[5] Qing Chang,et al. A node authentication protocol based on ECC in WSN , 2010, 2010 International Conference On Computer Design and Applications.
[6] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[7] Yuan-Ting Zhang,et al. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.
[8] Aref Meddeb,et al. A secure electric energy management in smart home , 2017, Int. J. Commun. Syst..
[9] James Newsome,et al. Access right assignment mechanisms for secure home networks , 2011, Journal of Communications and Networks.
[10] Shen Guicheng,et al. Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[11] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[12] P. Balamuralidhar,et al. One time password authentication scheme based on elliptic curves for Internet of Things (IoT) , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).
[13] Qiuhua Wang,et al. A digital memories based user authentication scheme with privacy preservation , 2017, PloS one.
[14] Ivan Stojmenovic. Access Control in Distributed Systems: Merging Theory with Practice , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[16] Roksana Boreli,et al. An experimental study of security and privacy risks with emerging household appliances , 2014, 2014 IEEE Conference on Communications and Network Security.
[17] Jian Shen,et al. Future Generation Computer Systems , 2022 .