A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes
暂无分享,去创建一个
Yi Jiang | Qingyi Zhu | Yong Shen | Qingyi Zhu | Yi Jiang | Yong Shen
[1] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[2] Mourad Debbabi,et al. Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.
[3] Francesco Palmieri,et al. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..
[4] Jongsung Kim,et al. A secure ECC-based RFID mutual authentication protocol for internet of things , 2016, The Journal of Supercomputing.
[5] R. G. V. Bramley,et al. Farmer attitudes to the use of sensors and automation in fertilizer decision-making: nitrogen fertilization in the Australian grains sector , 2018, Precision Agriculture.
[6] Kuldip Singh,et al. A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..
[7] Antonio Iera,et al. Energy Efficient IoT Data Collection in Smart Cities Exploiting D2D Communications , 2016, Sensors.
[8] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[9] Naixue Xiong,et al. A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks , 2016, Sensors.
[10] YoungHo Park,et al. Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment , 2018, 2018 International Conference on Electronics, Information, and Communication (ICEIC).
[11] Charlie Wilson,et al. Benefits and risks of smart home technologies , 2017 .
[12] Michael Scott,et al. Faster ECC over 픽2521-1 , 2014, IACR Cryptol. ePrint Arch..
[13] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[14] Burak Kantarci,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.
[15] Ravi Kishore Kodali,et al. ECDH based security model for IoT using ESP8266 , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[16] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[17] Savvas Papagiannidis,et al. A systematic review of the smart home literature: A user perspective , 2019, Technological Forecasting and Social Change.
[18] Dao Shun Wang,et al. A collaborative secret sharing scheme based on the Chinese Remainder Theorem. , 2019, Mathematical biosciences and engineering : MBE.
[19] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[20] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[21] Antonio F. Gómez-Skarmeta,et al. DCapBAC: embedding authorization logic into smart things through ECC optimizations , 2016, Int. J. Comput. Math..
[22] Xiaofeng Yin,et al. Stochastic Optimal Energy Management of Smart Home With PEV Energy Storage , 2018, IEEE Transactions on Smart Grid.
[23] Guanhua Zhang,et al. An efficient privacy protection solution for smart home application platform , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[24] Jian Shen,et al. Secure data uploading scheme for a smart home system , 2018, Inf. Sci..
[25] Awais Ahmad,et al. Real-time secure communication for Smart City in high-speed Big Data environment , 2017, Future Gener. Comput. Syst..
[26] Ion Bica,et al. A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..
[27] Ying Wah Teh,et al. Mining Personal Data Using Smartphones and Wearable Devices: A Survey , 2015, Sensors.
[28] Zhibo Pang,et al. Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.
[29] Vineet Sahula,et al. Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).