Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
暂无分享,去创建一个
Ashok Kumar Das | Kannan Srinathan | Jangirala Srinivas | Minho Jo | Saurav Malani | K. Srinathan | A. Das | Minho Jo | Jangirala Srinivas | Saurav Malani
[1] Sy-Yen Kuo,et al. Key Management in Internet of Things via Kronecker Product , 2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC).
[2] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[3] Hongke Zhang,et al. Adaptive Transmission Control for Software Defined Vehicular Networks , 2019, IEEE Wireless Communications Letters.
[4] An Braeken,et al. eDAAAS: Efficient distributed anonymous authentication and access in smart homes , 2016, Int. J. Distributed Sens. Networks.
[5] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[6] Athanasios V. Vasilakos,et al. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.
[7] Hui-Feng Huang,et al. A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.
[8] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[9] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[10] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[11] M. Ylianttila,et al. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications , 2015, IEEE Access.
[12] Wenchao Xu,et al. Big Data Driven Vehicular Networks , 2018, IEEE Network.
[13] Ashok Kumar Das,et al. An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.
[14] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[15] Chunhua Jin,et al. Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..
[16] Chun Chen,et al. Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[17] Sherali Zeadally,et al. Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..
[18] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[19] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[20] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[21] Ashok Kumar Das. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.
[22] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[23] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2017, IEEE Internet of Things Journal.
[24] Sung-Woon Lee,et al. Enhanced novel access control protocol over wireless sensor networks , 2009, IEEE Transactions on Consumer Electronics.
[25] Hui-Feng Huang,et al. A New Design of Access Control in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.
[26] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[27] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[28] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[29] Da-Zhi Sun,et al. On the security of an enhanced novel access control protocol for wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.
[30] Antonio F. Gómez-Skarmeta,et al. Holistic Privacy-Preserving Identity Management System for the Internet of Things , 2017, Mob. Inf. Syst..
[31] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[32] Elaine B. Barker,et al. Recommendation for key management: , 2019 .
[33] Giancarlo Succi,et al. Authentication in cloud-driven IoT-based big data environment: Survey and outlook , 2019, J. Syst. Archit..
[34] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[35] Athanasios V. Vasilakos,et al. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.
[36] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[37] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[38] Kuo-Ching Liu,et al. A New Dynamic Access Control in Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[39] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[40] Hongke Zhang,et al. Enhancing Crowd Collaborations for Software Defined Vehicular Networks , 2017, IEEE Communications Magazine.
[41] Joel J. P. C. Rodrigues,et al. Cloud Centric Authentication for Wearable Healthcare Monitoring System , 2019, IEEE Transactions on Dependable and Secure Computing.
[42] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[43] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[44] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[45] Yi Luo,et al. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT , 2018, Secur. Commun. Networks.
[46] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[47] Kim-Kwang Raymond Choo,et al. Secure Key Agreement and Key Protection for Mobile Device User Authentication , 2019, IEEE Transactions on Information Forensics and Security.
[48] Heejo Lee,et al. An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2009, Journal of Communications and Networks.
[49] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.