A Proxy Signature-Based Drone Authentication in 5G D2D Networks
暂无分享,去创建一个
[1] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[2] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[3] Adrien Koutsos,et al. The 5G-AKA Authentication Protocol Privacy , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Jean-Philippe Aumasson,et al. SipHash: A Fast Short-Input PRF , 2012, INDOCRYPT.
[5] Jianfeng Ma,et al. Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing , 2019, Secur. Commun. Networks.
[6] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[7] Wei-Bin Lee,et al. A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.
[8] Drummond Reed,et al. OpenID 2.0: a platform for user-centric identity management , 2006, DIM '06.
[9] Aaron Hunter,et al. Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems , 2019, 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
[10] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[11] Athanasios V. Vasilakos,et al. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.
[12] Pascal Lorenz,et al. Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment , 2020, IEEE Transactions on Vehicular Technology.
[13] Jianfeng Ma,et al. Lightweight Security Authentication Mechanism Towards UAV Networks , 2019, 2019 International Conference on Networking and Network Applications (NaNA).