Multidomain security authentication for the Internet of things

[1]  Poom Kumam,et al.  Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption , 2019 .

[2]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[3]  Dan Wang,et al.  AllerGAtlas 1.0: a human allergy-related genes database , 2018, Database J. Biol. Databases Curation.

[4]  Ruifang Wang,et al.  A Cross-Domain Alliance Authentication Scheme based on Bilinear Group , 2014 .

[5]  Liehuang Zhu,et al.  An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.

[6]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[7]  Tian-Fu Lee,et al.  An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring , 2019, Sensors.

[8]  Mohammad S. Obaidat,et al.  A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..

[9]  Vanga Odelu,et al.  Provably secure pseudo-identity based device authentication for smart cities environment , 2018 .

[10]  Longfei Wu,et al.  Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..

[11]  Chen Liang,et al.  A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.

[12]  Sencun Zhu,et al.  Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem , 2020, IEEE Transactions on Mobile Computing.

[13]  Yidong Li,et al.  BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..

[14]  Ping Wang,et al.  On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.

[15]  P. Vasudeva Reddy,et al.  Efficient Pairing-Free Identity-Based ADS-B Authentication Scheme With Batch Verification , 2019, IEEE Transactions on Aerospace and Electronic Systems.

[16]  Yong Gan,et al.  Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.

[17]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[18]  Wang Ruifang,et al.  A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.

[19]  Xiangliang Zhang,et al.  Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..

[20]  Xiaohui Kuang,et al.  Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.

[21]  Chen Liang,et al.  A fault-tolerant and energy-efficient continuous data protection system , 2019, J. Ambient Intell. Humaniz. Comput..

[22]  Longfei Wu,et al.  EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.

[23]  Chin-Ling Chen,et al.  A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment , 2016, Int. J. Data Warehous. Min..

[24]  Aman Jain,et al.  Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks , 2017, Cluster Computing.

[25]  Xiaomin Wang,et al.  A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems , 2015, Secur. Commun. Networks.

[26]  Eleftheria Makri,et al.  Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..

[27]  Hong Xu,et al.  An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography , 2019, KSII Trans. Internet Inf. Syst..

[28]  Xiangliang Zhang,et al.  CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[29]  Xiangjie Kong,et al.  PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs , 2018, IEEE Access.