Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol
暂无分享,去创建一个
[1] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[2] Nuno Pereira,et al. Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.
[3] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[4] Jumana Waleed,et al. Smart home as a new trend, a simplicity led to revolution , 2018, 2018 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES).
[5] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[6] Moncef Amara,et al. Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.
[7] Sandra Sendra,et al. Integration of LoRaWAN and 4G/5G for the Industrial Internet of Things , 2018, IEEE Communications Magazine.
[8] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[9] Konstantin Mikhaylov,et al. Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology , 2016 .
[10] Padma Bh,et al. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .
[11] Duncan S. Wong,et al. Analysis and improvement of an authenticated key exchange protocol for sensor networks , 2005, IEEE Communications Letters.
[12] Ethiopia Nigussie,et al. Security of LoRaWAN v1.1 in Backward Compatibility Scenarios , 2018, FNC/MobiSPC.
[13] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[14] Nibras Raad,et al. Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography , 2019, 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA).
[15] Ahcène Bounceur,et al. A study of LoRa low power and wide area network technology , 2017, 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[16] Manuel Mazzara,et al. The Internet of Hackable Things , 2016, SEDA.