A group-based security protocol for machine-type communications in LTE-advanced
暂无分享,去创建一个
[1] Geng Wu,et al. M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.
[2] Jui-Tang Wang,et al. Group-Based Authentication and Key Agreement , 2012, Wirel. Pers. Commun..
[3] Mohamed Eltoweissy,et al. Group Authentication Protocol for Mobile Networks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).
[4] Soon Yong Lim,et al. Solving the data overload: Device-to-device bearer control architecture for cellular data offloading , 2013, IEEE Vehicular Technology Magazine.
[5] Tarik Taleb,et al. Machine type communications in 3GPP networks: potential, challenges, and solutions , 2012, IEEE Communications Magazine.
[6] Xiao Lu,et al. Machine-to-machine communications for home energy management system in smart grid , 2011, IEEE Communications Magazine.
[7] Hung-Yu Chien,et al. ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.
[8] Sushil Jajodia,et al. Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.
[9] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[10] Jin Cao,et al. Dynamic Group Based Authentication Protocol for Machine Type Communications , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[11] Puneet Jain,et al. Machine type communications in 3GPP systems , 2012, IEEE Communications Magazine.
[12] Giuseppe Piro,et al. An LTE module for the ns-3 network simulator , 2011, SimuTools.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[14] Jin Cao,et al. A group-based authentication and key agreement for MTC in LTE networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[15] Tzonelih Hwang,et al. Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.
[16] Hong Wang,et al. EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications , 2013, Int. J. Distributed Sens. Networks.
[17] Kwang-Cheng Chen,et al. Toward ubiquitous massive accesses in 3GPP machine-to-machine communications , 2011, IEEE Communications Magazine.
[18] Ben Smyth,et al. ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .
[19] Bala Srinivasan,et al. An Individual and Group Authentication Model for Wireless Network Services , 2010, J. Convergence Inf. Technol..
[20] Xuemin Shen,et al. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks , 2013, Comput. Networks.
[21] Hyoung-Kee Choi,et al. An efficient and versatile key management protocol for secure smart grid communications , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[22] Hyoung-Kee Choi,et al. Security Analysis of Handover Key Management in 4G LTE/SAE Networks , 2014, IEEE Transactions on Mobile Computing.
[23] Nei Kato,et al. Toward intelligent machine-to-machine communications in smart grid , 2011, IEEE Communications Magazine.