A Study on the Security Algorithm for Contexts in Smart Cities
暂无分享,去创建一个
Kitae Bae | Hoon Ko | Sang Heon Kim | Kyung Jin An | Hoon Ko | Kitae Bae | Sang Heon Kim | Kyung-jin An
[1] Peng Gong,et al. A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.
[2] Zita Vale,et al. The cross crypto scheme cipher integration for securing SCADA component communication , 2013 .
[3] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[4] Goreti Marreiros,et al. A study on security grade assignment model for mobile users in urban computing , 2013 .
[5] Rosslin John Robles,et al. Symmetric-Key Encryption for Wireless Internet SCADA , 2009, FGIT-SecTech.
[6] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[7] Chin-Feng Lai,et al. OSGi-based services architecture for Cyber-Physical Home Control Systems , 2011, Comput. Commun..
[8] Zita A. Vale,et al. Intelligent supervisory control system for home devices using a cyber physical approach , 2012, Integr. Comput. Aided Eng..
[9] Zita Vale,et al. A study on dynamic state information (DSI) around users for safe urban life , 2012, Comput. Math. Appl..
[10] Zita Vale,et al. Utilization of different encryption schemes for securing SCADA component communication , 2013 .