Securing Demand Response Management: A Certificate-Based Access Control in Smart Grid Edge Computing Infrastructure
暂无分享,去创建一个
Fadi Al-Turjman | Shehzad Ashraf Chaudhry | Abdullah Baz | Hosam Alhakami | H. Alhakami | F. Al-turjman | A. Baz
[1] Mauro Conti,et al. ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System , 2019, IEEE Transactions on Industrial Informatics.
[2] Muhammad Usman,et al. A provable and secure mobile user authentication scheme for mobile cloud computing services , 2019, Int. J. Commun. Syst..
[3] Kijoon Chae,et al. Secure Authentication for Structured Smart Grid System , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[4] Laurence T. Yang,et al. A Tensor-Based Big Service Framework for Enhanced Living Environments , 2016, IEEE Cloud Computing.
[5] Athanasios V. Vasilakos,et al. Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..
[6] Jia-Lun Tsai,et al. Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.
[7] Debasis Giri,et al. A robust authentication and access control protocol for securing wireless healthcare sensor networks , 2020, J. Inf. Secur. Appl..
[8] Arif Ur Rahman,et al. Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key , 2019, Int. J. Commun. Syst..
[9] Ali Nauman,et al. Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges , 2020, IEEE Access.
[10] Fadi Al-Turjman. Smart Grid in IoT-Enabled Spaces : The Road to Intelligence in Power , 2020 .
[11] Mauro Conti,et al. Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.
[12] Zeeshan Ali,et al. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.
[13] Fadi Al-Turjman,et al. Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems , 2020, Comput. Commun..
[14] Tsu-Yang Wu,et al. Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid , 2020 .
[15] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[16] Muhammad Ahsan Latif,et al. Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.
[17] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[18] Ely Salwana,et al. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography , 2019, Sensors.
[19] Mohammad Hesam Tadayon,et al. A Novel Identity-Based Key Establishment Method for Advanced Metering Infrastructure in Smart Grid , 2018, IEEE Transactions on Smart Grid.
[20] Biplab Sikdar,et al. Two-Factor Authentication for IoT With Location Information , 2019, IEEE Internet of Things Journal.
[21] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[22] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[23] Saru Kumari,et al. An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure , 2019, Int. J. Commun. Syst..
[24] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[25] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[26] Fadi Al-Turjman,et al. Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid , 2020 .
[27] Palash Sarkar,et al. A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.
[28] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[29] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[30] Dariush Abbasinezhad-Mood,et al. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications , 2018, Future Gener. Comput. Syst..
[31] Huaqun Wang,et al. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography , 2016, IET Commun..
[32] Biplab Sikdar,et al. Data Provenance for IoT With Light Weight Authentication and Privacy Preservation , 2019, IEEE Internet of Things Journal.
[33] Yining Liu,et al. A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.
[34] Tugrul Yanik,et al. A Survey of SIP Authentication and Key Agreement Schemes , 2014, IEEE Communications Surveys & Tutorials.
[35] Rongxing Lu,et al. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid , 2016, IEEE Transactions on Information Forensics and Security.
[36] Xiong Li,et al. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication , 2018, Future Gener. Comput. Syst..
[37] Shehzad Ashraf Chaudhry,et al. Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.
[38] Xiong Li,et al. Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure , 2018, Future Gener. Comput. Syst..
[39] SK Hafizul Islam,et al. A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack , 2014, Wirel. Pers. Commun..