T-IP: A self-trustworthy and secure Internet protocol
暂无分享,去创建一个
Xiaofeng Wang | Jinshu Su | Baosheng Wang | Huan Zhou | Qianqian Xing | Pengkun Li | Jinshu Su | Xiaofeng Wang | Baosheng Wang | Huan Zhou | Qianqian Xing | Pengkun Li
[1] Fan Yang,et al. The QUIC Transport Protocol: Design and Internet-Scale Deployment , 2017, SIGCOMM.
[2] Tanja Lange,et al. MinimaLT: minimal-latency networking through better security , 2013, IACR Cryptol. ePrint Arch..
[3] Usha Devi Gandhi,et al. Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application , 2017, The Journal of Supercomputing.
[4] Su Jinshu,et al. SA-IBE: A Secure and Accountable Identity-based Encryption Scheme , 2011 .
[5] Lixia Zhang,et al. Stream Control Transmission Protocol , 2000, RFC.
[6] Qiong Huang,et al. Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more , 2016, International Journal of Information Security.
[7] Sumit Mishra,et al. Network security protocol for constrained resource devices in Internet of things , 2015, 2015 Annual IEEE India Conference (INDICON).
[8] Diana K. Smetters,et al. Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC , 2003, USENIX Security Symposium.
[9] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[10] Mark Handley,et al. The Case for Ubiquitous Transport-Level Encryption , 2010, USENIX Security Symposium.
[11] Gabriel Montenegro,et al. IPv6 Opportunistic Encryption , 2002 .
[12] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[13] Azeddine Bilami,et al. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things , 2015, Comput. Networks.