Authentication Methods for UAV Communication
暂无分享,去创建一个
Fernando Santos Osório | Jean Amaro | Mariana Rodrigues | Kalinka R. J. L. Branco | Mariana Rodrigues | F. Osório | K. Branco | J. Amaro
[1] Min Xiao,et al. An Efficient V2I Authentication Scheme for VANETs , 2018, Mob. Inf. Syst..
[2] Ming Lim,et al. An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems , 2018, China Communications.
[3] Jianfeng Ma,et al. A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks , 2017, Int. J. Netw. Manag..
[4] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[5] Victor C. M. Leung,et al. Smart grid authentication and key management for unicast and multicast communications , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.
[6] AltawyRiham,et al. Security, Privacy, and Safety Aspects of Civilian Drones , 2016 .
[7] Daejun Park,et al. Security Authentication System Using Encrypted Channel on UAV Network , 2017, 2017 First IEEE International Conference on Robotic Computing (IRC).
[8] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[9] Dindayal Mahto,et al. Performance Analysis of RSA and Elliptic Curve Cryptography , 2018, Int. J. Netw. Secur..
[10] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[11] Diana Bohm,et al. Computer And Information Security Handbook , 2016 .
[12] Ahmed Serhrouchni,et al. A Survey of Internet of Things (IoT) Authentication Schemes † , 2019, Sensors.
[13] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[14] Tarik Taleb,et al. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.
[15] Quynh Dang,et al. Changes in Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard , 2013, Cryptologia.
[16] Sidi-Mohammed Senouci,et al. Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution , 2018, The Journal of Supercomputing.
[17] Lav Gupta,et al. Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.
[18] Ouajdi Korbaa,et al. Privacy Preservation and Drone Authentication Using ID-Based Signcryption , 2018, SoMeT.
[19] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[20] Mohammad Hesam Tadayon,et al. A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.