Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model
暂无分享,去创建一个
[1] Depeng Jin,et al. Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.
[2] T. Hallett,et al. The impact of HCV therapy in a high HIV-HCV prevalence population: A modeling study on people who inject drugs in Ho Chi Minh City, Vietnam , 2017, PloS one.
[3] Ting-Yi Chang,et al. Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments , 2018, Symmetry.
[4] Hua-Jun Hong. From Cloud Computing to Fog Computing: Unleash the Power of Edge and End Devices , 2017, 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[5] Mauro Conti,et al. Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.
[6] Giuseppe Piro,et al. When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[7] Ping Wang,et al. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.
[8] Yan Zhang,et al. Attack Detection and Distributed Forensics in Machine-to-Machine Networks , 2016, IEEE Network.
[9] Jia-Lun Tsai,et al. Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.
[10] Dapeng Wu,et al. Fault-Tolerant and Scalable Key Management for Smart Grid , 2011, IEEE Transactions on Smart Grid.
[11] Jiri Hosek,et al. On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.
[12] Xiong Li,et al. Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .
[13] Cheng-Chi Lee,et al. A Computation-Efficient Three-Party Encrypted Key Exchange Protocol , 2012 .
[14] Andrei Gurtov,et al. Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.
[15] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[16] Scott A. Vanstone,et al. Provably Secure Implicit Certificate Schemes , 2002, Financial Cryptography.
[17] An Braeken,et al. An efficient anonymous authentication protocol in multiple server communication networks (EAAM) , 2017, The Journal of Supercomputing.
[18] Kim-Kwang Raymond Choo,et al. Authenticated key agreement scheme for fog-driven IoT healthcare system , 2018, Wirel. Networks.
[19] Yuwen Chen,et al. An Anonymous Authentication and Key Establish Scheme for Smart Grid: FAuth , 2017 .
[20] Tzonelih Hwang,et al. Three-party authenticated key agreements for optimal communication , 2017, PloS one.
[21] David Pointcheval,et al. Multi-factor Authenticated Key Exchange , 2008, ACNS.
[22] Sonia Aïssa,et al. Performance modeling of message dissemination in vehicular ad hoc networks , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.
[23] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[24] Bo Ai,et al. On the Feasibility of High Speed Railway mmWave Channels in Tunnel Scenario , 2017, Wirel. Commun. Mob. Comput..
[25] An Braeken,et al. Efficient anonymous user authentication on server without secure channel during registration , 2016, 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech).
[26] Sungyoung Lee,et al. Health Fog: a novel framework for health and wellness applications , 2016, The Journal of Supercomputing.
[27] Yongge Wang,et al. Secure Key Distribution for the Smart Grid , 2012, IEEE Transactions on Smart Grid.
[28] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[29] M. Shamim Hossain,et al. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.
[30] Meng Wu,et al. Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.
[31] Jianhua Li,et al. Escrowable identity-based authenticated key agreement protocol with strong security , 2013, Comput. Math. Appl..
[32] Li Gong,et al. Lower bounds on messages and rounds for network authentication protocols , 1993, CCS '93.
[33] Sherali Zeadally,et al. Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography , 2017, Wirel. Commun. Mob. Comput..
[34] Xiaoyan Wang,et al. Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.