A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network
暂无分享,去创建一个
Zheng Qin | Ding Yong | Jiliang Zhang | Yuanjing Zhang | Xiao Tan | Xingwei Wang | Jiliang Zhang | Zheng Qin | Xiao Tan | Yuanjing Zhang | Ding Yong | Xingwei Wang
[1] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[2] Benedikt Heinz,et al. Localized electromagnetic analysis of RO PUFs , 2013, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[3] Yintang Yang,et al. Secure Authentication Protocol for Mobile Payment , 2018, Tsinghua Science and Technology.
[4] Yipeng Ding,et al. A Multi-Target Detection Algorithm Using High-Order Differential Equation , 2019, IEEE Sensors Journal.
[5] Zheng Qin,et al. Frequency Offset-Based Ring Oscillator Physical Unclonable Function , 2018, IEEE Transactions on Multi-Scale Computing Systems.
[6] Gang Qu,et al. Reconfigurable Binding against FPGA Replay Attacks , 2015, TODE.
[7] Ming Li,et al. Authenticated secret key extraction using channel characteristics for body area networks , 2012, CCS '12.
[8] P. Samundiswary,et al. Wireless body area network security issues — Survey , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[9] Yongqiang Lyu,et al. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing , 2015, IEEE Transactions on Information Forensics and Security.
[10] Peiru Fan,et al. Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks , 2019, Tsinghua Science and Technology.
[11] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[12] Yuesheng Zhu,et al. TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks , 2014, Wirel. Pers. Commun..
[13] Saleha Mubarak AlMheiri,et al. Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).
[14] Manoj Kumar. Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network , 2014, 2014 International Conference on Information Technology.
[15] Akram Alomainy,et al. Double Threshold Authentication Using Body Area Radio Channel Characteristics , 2016, IEEE Communications Letters.
[16] Qiang Zhou,et al. Crossover Ring Oscillator PUF , 2017, 2017 18th International Symposium on Quality Electronic Design (ISQED).
[17] Qiang Zhou,et al. A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs , 2014, Journal of Computer Science and Technology.
[18] Hesham N. Elmahdy,et al. PMAS: A proposed mutual authentication scheme for wireless body area networks , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).
[19] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[20] Gang Qu,et al. HCIC: Hardware-Assisted Control-Flow Integrity Checking , 2018, IEEE Internet of Things Journal.
[21] Arun Kumar Sangaiah,et al. A privacy-preserving friend recommendation scheme in online social networks , 2018 .
[22] Richard E. Newman,et al. Fast Response PKC-Based Broadcast Authentication in Wireless Sensor Networks , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[23] Juan Zhang,et al. Application of Linear Predictive Coding and Data Fusion Process for Target Tracking by Doppler Through-Wall Radar , 2019, IEEE Transactions on Microwave Theory and Techniques.
[24] Kim-Kwang Raymond Choo,et al. Secure hitch in location based social networks , 2017, Comput. Commun..
[25] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[26] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[27] Jiliang Zhang,et al. A Practical Logic Obfuscation Technique for Hardware Security , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.