An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology
暂无分享,去创建一个
Xiaojiang Du | Longfei Wu | Wei Wang | Bin Lin | Xiaojiang Du | Longfei Wu | B. Lin | Wei Wang
[1] Phillip H. Griffin. Security for Ambient Assisted Living: Multi-factor Authentication in the Internet of Things , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[2] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[3] Grant Hernandez,et al. Smart Nest Thermostat A Smart Spy in Your Home , 2014 .
[4] Xiaojiang Du,et al. An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[5] Jie Wu,et al. Wormhole defense for cooperative trajectory mapping , 2012, Int. J. Parallel Emergent Distributed Syst..
[6] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[7] Mohsen Guizani,et al. Stream-based cipher feedback mode in wireless error channel , 2009, IEEE Transactions on Wireless Communications.
[8] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[9] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).
[10] Gongjun Yan,et al. Trust On the Security of Wireless Vehicular Ad-hoc Networking , 2015, Ad Hoc Sens. Wirel. Networks.
[11] Xiaojiang Du,et al. Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.
[12] Jie Wu,et al. Sybil defenses in mobile social networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[13] Matthew Green,et al. Decentralized Anonymous Credentials , 2014, NDSS.
[14] Qing Yang,et al. On the Security of Information Dissemination in the Internet-of-Vehicles , 2017 .
[15] Kenji Takahashi,et al. Authentication using multiple communication channels , 2005, DIM '05.
[16] Danda B. Rawat,et al. Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.
[17] Xiaojiang Du,et al. A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[18] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[19] Xiaojiang Du,et al. Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[20] Xiaojiang Du,et al. Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.
[21] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[22] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[23] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[24] Jie Wu,et al. A Survey of Sybil Attacks in Networks , 2013 .
[25] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.