Multidomain security authentication for the Internet of things
暂无分享,去创建一个
Xiaohui Kuang | Ruifang Wang | Junling Yuan | Qikun Zhang | Yongjiao Li | Yuanpan Zheng | Kunyuan Zhao | Qikun Zhang | Yongjiao Li | Kunyuan Zhao | Xiaohui Kuang | Junling Yuan | Ruifang Wang | Yuanpan Zheng
[1] Poom Kumam,et al. Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption , 2019 .
[2] Chen Liang,et al. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..
[3] Dan Wang,et al. AllerGAtlas 1.0: a human allergy-related genes database , 2018, Database J. Biol. Databases Curation.
[4] Ruifang Wang,et al. A Cross-Domain Alliance Authentication Scheme based on Bilinear Group , 2014 .
[5] Liehuang Zhu,et al. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks , 2018, Sensors.
[6] Chen Liang,et al. A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..
[7] Tian-Fu Lee,et al. An Enhanced Lightweight Dynamic Pseudonym Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring , 2019, Sensors.
[8] Mohammad S. Obaidat,et al. A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs , 2017, Future Gener. Comput. Syst..
[9] Vanga Odelu,et al. Provably secure pseudo-identity based device authentication for smart cities environment , 2018 .
[10] Longfei Wu,et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..
[11] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[12] Sencun Zhu,et al. Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem , 2020, IEEE Transactions on Mobile Computing.
[13] Yidong Li,et al. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..
[14] Ping Wang,et al. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.
[15] P. Vasudeva Reddy,et al. Efficient Pairing-Free Identity-Based ADS-B Authentication Scheme With Batch Verification , 2019, IEEE Transactions on Aerospace and Electronic Systems.
[16] Yong Gan,et al. Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.
[17] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[18] Wang Ruifang,et al. A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application , 2018, IEEE Access.
[19] Xiangliang Zhang,et al. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers , 2018, Future Gener. Comput. Syst..
[20] Xiaohui Kuang,et al. Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation , 2019, Applied Sciences.
[21] Chen Liang,et al. A fault-tolerant and energy-efficient continuous data protection system , 2019, J. Ambient Intell. Humaniz. Comput..
[22] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[23] Chin-Ling Chen,et al. A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment , 2016, Int. J. Data Warehous. Min..
[24] Aman Jain,et al. Energy aware and fast authentication scheme using identity based encryption in wireless sensor networks , 2017, Cluster Computing.
[25] Xiaomin Wang,et al. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems , 2015, Secur. Commun. Networks.
[26] Eleftheria Makri,et al. Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..
[27] Hong Xu,et al. An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography , 2019, KSII Trans. Internet Inf. Syst..
[28] Xiangliang Zhang,et al. CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.
[29] Xiangjie Kong,et al. PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs , 2018, IEEE Access.