Identity-based mutual device authentication schemes for PLC system
暂无分享,去创建一个
Choong Seon Hong | Joon Heo | Seong Ho Ju | Yong Hoon Lim | Moon Seok Choi | Seong-ho Ju | Yong-hoon Lim | Moon-Seok Choi | C. Hong | Joon Heo
[1] Choong Seon Hong,et al. A Security Mechanism for Automation Control in PLC-based Networks , 2007, 2007 IEEE International Symposium on Power Line Communications and Its Applications.
[2] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[3] Ross J. Anderson,et al. Protecting domestic power-line communications , 2006, SOUPS '06.
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] K. C. Reddy,et al. Signcryption scheme for Identity-based Cryptosystems , 2003, IACR Cryptol. ePrint Arch..
[6] Theodoulos Garefalakis,et al. Public key infrastructure in mobile systems , 2002 .
[7] T. Tran-Quoc,et al. Distribution network modeling for power line communication applications , 2005, International Symposium on Power Line Communications and Its Applications, 2005..
[8] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[9] Khanh V. Nguyen. Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography , 2006, International conference on Networking and Services (ICNS'06).
[10] R. Newman,et al. HomePlug AV Security Mechanisms , 2007, 2007 IEEE International Symposium on Power Line Communications and Its Applications.