Implementation Of An Efficient Security Scheme Through Elliptic Curve Cryptography Based Radio-Frequency Identification(RFID) In Context Of Internet Of Things
暂无分享,去创建一个
Moumita Chakraborty | Bappaditya Jana | Tamoghna Mandal | Moumita Chakraborty | Bappaditya Jana | Tamoghna Mandal
[1] Bappaditya Jana,et al. A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks(CR-VANETs) , 2016, 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE).
[2] Bappaditya Jana,et al. A Hybrid Task Scheduling Approach Based on Genetic Algorithm and Particle Swarm Optimization Technique in Cloud Environment , 2018 .
[3] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[4] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[5] Rajashree V Biradar,et al. Classification and Comparison of Routing Protocols in Wireless Sensor Networks , 2009 .
[6] Bappaditya Jana,et al. A multilevel encryption technique in cloud security , 2017, 2017 7th International Conference on Communication Systems and Network Technologies (CSNT).
[7] Bappaditya Jana,et al. A performance analysis on elliptic curve cryptography in network security , 2016, 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE).
[8] Tae Hwan Oh,et al. RFID Implementation and Security Issues , 2011, ISA.
[9] Ozgur B. Akan,et al. Millimetre wave communication for 5G IoT applications , 2016 .
[10] Bappaditya Jana,et al. Quantum cryptography: Overview, security issues and future challenges , 2017, 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix).
[11] Narendran Rajagopalan,et al. Internet of Things: A Survey on IoT Protocol Standards , 2018 .
[12] Era Johri,et al. Home Automation Using Internet of Things (IoT) for Smart Cities , 2018 .
[13] Thorsten Wild,et al. Waveform contenders for 5G — OFDM vs. FBMC vs. UFMC , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).
[14] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[15] Prashant Krishnamurthy,et al. Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.
[16] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[17] Christof Paar,et al. RFID. Security and Privacy , 2011, Lecture Notes in Computer Science.
[18] Jolly Soparia,et al. A Survey on Comparative Study of Wireless Sensor Network Topologies , 2014 .
[19] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[20] Chao Yang,et al. A Research on Issues Related to RFID Security and Privacy , 2007, I3E.
[21] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[22] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[23] XU Chen-guang. The Effect of Social Technology on the Development of the Internet of Things , 2011 .
[24] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[25] Rönne Reimann,et al. Locating Technology for AAL Applications with Direction Finding and Distance Measurement by Narrow Bandwidth Phase Analysis , 2012, EvAAL.
[26] George Mastorakis,et al. On the Track of 5G Radio Access Network for IoT Wireless Spectrum Sharing in Device Positioning Applications , 2016 .
[27] Grzegorz Kolaczek,et al. RFID Security: A Method for Tracking Prevention , 2016, ISCIS.
[28] Wei Han. Research of Intelligent Campus System Based on IOT , 2011 .
[29] Marek Klonowski,et al. Privacy Protection for RFID with Hidden Subset Identifiers , 2008, Pervasive.
[30] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.