Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things
暂无分享,去创建一个
[1] Laurence T. Yang,et al. Cyberentity Security in the Internet of Things , 2013, Computer.
[2] Wu Qi,et al. Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[3] Kai-Di Chang,et al. Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs , 2012, KSII Trans. Internet Inf. Syst..
[4] T. J. Rivlin. The Chebyshev polynomials , 1974 .
[5] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[6] Zhu Wang,et al. From the internet of things to embedded intelligence , 2013, World Wide Web.
[7] Jiming Chen,et al. Smart community: an internet of things application , 2011, IEEE Communications Magazine.
[8] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[9] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[10] Jingcheng Wang,et al. A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.
[11] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[12] Spyros G. Denazis,et al. Identity management directions in future internet , 2011, IEEE Communications Magazine.
[13] Qiaoyan Wen,et al. Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology , 2011, CSISE.
[14] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[15] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[16] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[17] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[18] Xingming Sun,et al. An Anonymity and Authentication Mechanism for Internet of Things , 2011 .
[19] Liang Chen,et al. Homomorphism Encryption Algorithm for Elementary Operations over Real Number Domain , 2012, CyberC.
[20] Óscar García-Morchón,et al. HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[21] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[22] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[23] Ren Fang,et al. Attribute-Based Access Control Mechanism for Perceptive Layer of the Internet of Things , 2011 .
[24] Guy Pujolle,et al. HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.
[25] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[26] Gerhard P. Hancke,et al. Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .
[27] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[28] J. Dicapua. Chebyshev Polynomials , 2019, Fibonacci and Lucas Numbers With Applications.
[29] Huansheng Ning,et al. Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.