Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things
暂无分享,去创建一个
D. He | Chengdong Gu | Jie Cui | Qingyan Zhang | Hong Zhong | Chengjie Gu
[1] J. Ritcey,et al. Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0 , 2022, IEEE Transactions on Industrial Informatics.
[2] Kun He,et al. XAuth: Efficient Privacy-Preserving Cross-Domain Authentication , 2022, IEEE Transactions on Dependable and Secure Computing.
[3] Kim-Kwang Raymond Choo,et al. Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones , 2022, IEEE Internet of Things Journal.
[4] Xuemin Shen,et al. Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks , 2022, IEEE Transactions on Intelligent Transportation Systems.
[5] Yan Xu,et al. Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT , 2021, IEEE Transactions on Industrial Electronics.
[6] Changyuan Wang,et al. An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[7] Guomin Yang,et al. An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things , 2021, IEEE Transactions on Industrial Informatics.
[8] Saru Kumari,et al. Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT , 2020, IEEE Internet of Things Journal.
[9] Neng Zhang,et al. Master-slave chain based trusted cross-domain authentication mechanism in IoT , 2020, J. Netw. Comput. Appl..
[10] Mohammad S. Obaidat,et al. Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs , 2020, IEEE Transactions on Industrial Informatics.
[11] Ke Xu,et al. Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT , 2020, IEEE Journal on Selected Areas in Communications.
[12] Jie Cui,et al. PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks , 2019, IEEE Transactions on Dependable and Secure Computing.
[13] Ashok Kumar Das,et al. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.
[14] Gerhard P. Hancke,et al. Overlay Virtualized Wireless Sensor Networks for Application in Industrial Internet of Things: A Review , 2018, Sensors.
[15] Chunhua Su,et al. Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.
[16] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[17] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[18] Wenping Ma,et al. CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS , 2018, Journal of Medical Systems.
[19] Zhiwei Wang,et al. A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..
[20] F. Richard Yu,et al. Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[21] Chao Yuan,et al. EIMAKP: Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System , 2017, Arabian Journal for Science and Engineering.
[22] Yuguang Fang,et al. CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks , 2016, Wirel. Networks.
[23] Xiaoyan Zhu,et al. An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.
[24] Xiaomin Wang,et al. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems , 2015, Secur. Commun. Networks.
[25] Jie Wu,et al. Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[26] Kyung-Ah Shim,et al. ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.
[27] Xingwei Wang,et al. A Cross Heterogeneous Domain Authentication Model Based on PKI , 2011, 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming.
[28] Xiaodong Lin,et al. An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.
[29] Antonio F. Gómez-Skarmeta,et al. PKI-based trust management in inter-domain scenarios , 2010, Comput. Secur..
[30] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[31] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[32] Adi Shamir,et al. How to share a secret , 1979, CACM.
[33] Yujian Zhang,et al. CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things , 2022, IEEE Transactions on Information Forensics and Security.
[34] Mehedi Masud,et al. Cross-domain secure data sharing using blockchain for industrial IoT , 2021, J. Parallel Distributed Comput..
[35] Jiujun Cheng,et al. Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs , 2021, IEEE Transactions on Information Forensics and Security.
[36] Maxim Raya,et al. Securing vehicular ad hoc networks , 2007, J. Comput. Secur..