A dynamic multiple-keys game-based industrial wireless sensor-cloud authentication scheme
暂无分享,去创建一个
[1] Jianhua Liu,et al. Evolutionary trust scheme of certificate game in mobile cloud computing , 2018, Soft Comput..
[2] Xinyi Huang,et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services , 2017, Future Gener. Comput. Syst..
[3] Zheng Yan,et al. CloudFile: A cloud data access control system based on mobile social trust , 2017, J. Netw. Comput. Appl..
[4] Bharti Joshi,et al. H-IBE: Hybrid-identity based encryption approach for cloud security with outsourced revocation , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[5] Uthpala Subodhani Premarathne,et al. Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes , 2015 .
[6] Jianhua Liu,et al. Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.
[7] Sanath S. Shenoy,et al. Real-time remote monitoring and operation of industrial devices using IoT and cloud , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
[8] Huaglory Tianfield,et al. Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing , 2018, IEEE Transactions on Big Data.
[9] R. Chitra,et al. Securing cloud from ddos attacks using intrusion detection system in virtual machine , 2013 .
[10] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[11] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[12] Chandra Sekhar Vorugunti. PPMUAS: A privacy preserving mobile user authentication system for cloud environment utilizing big data features , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[13] Ei Ei Mon,et al. The privacy-aware access control system using attribute-and role-based access control in private cloud , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[14] Sudip Misra,et al. TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks , 2016, IEEE Transactions on Computers.
[15] Maurizio Rebaudengo,et al. Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.
[16] J. Martin Leo Manickam,et al. Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[17] Dong Yang,et al. A trust management scheme for industrial wireless sensor networks , 2013, IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society.
[18] Mohammad Reza Aref,et al. A fuzzy fully distributed trust management system in wireless sensor networks , 2016 .
[19] Guangjie Han,et al. A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[20] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[21] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[22] Kim-Kwang Raymond Choo,et al. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.
[23] H. S. Fadewar,et al. Authentication scheme for insecure networks in cloud computing , 2016, 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC).