메뉴 건너뛰기




Volumn 34, Issue 8, 2011, Pages 1351-1364

A security transmission model for internet of things

Author keywords

Anonymous authentication; Anonymous transmission; Internet of Things; ONS query; Trusted computing

Indexed keywords

ANONYMOUS AUTHENTICATION; ANONYMOUS TRANSMISSION; INTERNET OF THINGS; ONS QUERY; TRUSTED COMPUTING;

EID: 80052689804     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1016.2011.01351     Document Type: Article
Times cited : (49)

References (17)
  • 1
    • 34248219805 scopus 로고    scopus 로고
    • Research on China Internet of Things services and management
    • (in Chinese)
    • Ning Huan-Sheng, Zhang Yu, Liu Fang-Li, Liu Wen-Ming et al. Research on China Internet of Things services and management. Acta Electronica Sinica, 2006, 34(12A): 2514-2517(in Chinese)
    • (2006) Acta Electronica Sinica , vol.34 , Issue.12 A , pp. 2514-2517
    • Ning, H.-S.1    Zhang, Y.2    Liu, F.-L.3    Liu, W.-M.4
  • 4
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • Luigi Atzori, Antonio Iera, Giacomo Morabito. The Internet of Things: A survey. Computer Networks, 2010, 54(1): 2787-2805
    • (2010) Computer Networks , vol.54 , Issue.1 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things-New security and privacy challenges
    • Weber Rolf H. Internet of Things-New security and privacy challenges. Computer Law & Security Review, 2010, 26(1): 23-30
    • (2010) Computer Law & Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber Rolf, H.1
  • 6
    • 78650936636 scopus 로고    scopus 로고
    • Research on global Internet of Things' developments and it's lonstruction in China
    • (in Chinese)
    • Ning Huan-Sheng, Xu Qun-Yu. Research on global Internet of Things' developments and it's lonstruction in China. Acta Electronica Sinica, 2010, 38(11): 2591-2599(in Chinese)
    • (2010) Acta Electronica Sinica , vol.38 , Issue.11 , pp. 2591-2599
    • Ning, H.-S.1    Xu, Q.-Y.2
  • 7
    • 80052687700 scopus 로고    scopus 로고
    • Network information security architecture based on Internet of Things
    • (in Chinese)
    • Liu Yan-Bing, Hu Wen-Ping, Du Jiang. Network information security architecture based on Internet of Things. ZTE Technology Journal, 2011, 17(1): 17-20(in Chinese)
    • (2011) ZTE Technology Journal , vol.17 , Issue.1 , pp. 17-20
    • Liu, Y.-B.1    Hu, W.-P.2    Du, J.3
  • 8
    • 68749088435 scopus 로고    scopus 로고
    • Design of anonymous authentication protocol for RFID
    • (in Chinese)
    • Deng Miao-Lei, Ma Jian-Feng, Zhou Li-Hua. Design of anonymous authentication protocol for RFID. Journal on Communications, 2009, 30(7): 20-26(in Chinese)
    • (2009) Journal on Communications , vol.30 , Issue.7 , pp. 20-26
    • Deng, M.-L.1    Ma, J.-F.2    Zhou, L.-H.3
  • 9
    • 33744964854 scopus 로고    scopus 로고
    • Design and analysis of cryptographic protocols for RFID
    • (in Chinese)
    • Zhou Yong-Bin, Feng Deng-Guo. Design and analysis of cryptographic protocols for RFID. Chinese Journal of Computers, 2006, 29(4): 581-589(in Chinese)
    • (2006) Chinese Journal of Computers , vol.29 , Issue.4 , pp. 581-589
    • Zhou, Y.-B.1    Feng, D.-G.2
  • 10
    • 65349109748 scopus 로고    scopus 로고
    • Research on Hash-based RFID security authentication protocol
    • (in Chinese)
    • Ding Zhen-Hua, Li Jin-Tao, Feng Bo. Research on Hash-based RFID security authentication protocol. Journal of Computer Research and Development, 2009, 46(4): 583-592(in Chinese)
    • (2009) Journal of Computer Research and Development , vol.46 , Issue.4 , pp. 583-592
    • Ding, Z.-H.1    Li, J.-T.2    Feng, B.3
  • 11
    • 80052673108 scopus 로고    scopus 로고
    • Privacy and data protection impact assessment framework for RFID applications
    • January 12, 2011
    • GS1, European Commission. Privacy and Data Protection Impact Assessment Framework for RFID Applications. January 12, 2011. http://ec.europa.eu/information_society/policy/rfid/ documents/infso-2011-00068.pdf
    • (2011)
  • 12
    • 51949113299 scopus 로고    scopus 로고
    • The EPCglobal architecture framework (V1.4)
    • December 15, 2010
    • Ken T, Felice A, Henri B, Paul D et al. The EPCglobal Architecture Framework (V1.4). December 15, 2010. http://www.gs1.org/gsmp/kc/epcglobal/architecture/ architecture_1_4-framework- 20101215.pdf
    • (2010)
    • Ken, T.1    Felice, A.2    Henri, B.3    Paul, D.4
  • 15
    • 78149388434 scopus 로고    scopus 로고
    • A controllable and trusted anonymous communication scheme
    • (in Chinese)
    • Wu Zhen-Qiang, Zhou Yan-Wei, Qiao Zi-Rui. A controllable and trusted anonymous communication scheme. Chinese Journal of Computers, 2010, 33(9): 1686-1702(in Chinese)
    • (2010) Chinese Journal of Computers , vol.33 , Issue.9 , pp. 1686-1702
    • Wu, Z.-Q.1    Zhou, Y.-W.2    Qiao, Z.-R.3
  • 16
    • 70350525668 scopus 로고    scopus 로고
    • Trusted and anonymous authentication scheme for wireless networks
    • (in Chinese)
    • Yang Li, Ma Jian-Feng, Zhu Jian-Ming. Trusted and anonymous authentication scheme for wireless networks. Journal on Communications, 2009, 30(9): 29-35(in Chinese)
    • (2009) Journal on Communications , vol.30 , Issue.9 , pp. 29-35
    • Yang, L.1    Ma, J.-F.2    Zhu, J.-M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.