메뉴 건너뛰기




Volumn , Issue , 2012, Pages 187-191

Identity establishment and capability based access control (IECAC) scheme for Internet of Things

Author keywords

Access Control; Capability; Identity Establishment

Indexed keywords

CAPABILITY; COMPUTATIONAL TIME; DENIAL OF SERVICE ATTACKS; ELLIPTICAL CURVE CRYPTOGRAPHIES; IDENTITY ESTABLISHMENT; INTERNET OF THINGS (IOT); PERFORMANCE ANALYSIS; PROTOCOL EVALUATION; SECURE COMMUNICATIONS; SECURITY PROTOCOL VERIFICATION;

EID: 84873426135     PISSN: 13476890     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (49)

References (19)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • of Bessel functions Phil. Trans. Roy. Soc. London A247 529-551, Apr. 1955
    • M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, pp. 66-75, 1991of Bessel functions," Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, Apr. 1955.
    • (1991) Scientific American , vol.265 , pp. 66-75
    • Weiser, M.1
  • 12
    • 84873445661 scopus 로고    scopus 로고
    • Avispa-a tool for Automated Validation of Internet Security Protocols
    • Avispa-a tool for Automated Validation of Internet Security Protocols. http://www.avispa-project.org.
  • 13
    • 0019649307 scopus 로고
    • On the security of public key protocols
    • IEEE
    • D. Dolev and A. C.-C. Yao. On the security of public key protocols. In FOCS, pages 350-357. IEEE, 1981.
    • (1981) FOCS , pp. 350-357
    • Dolev, D.1    Yao, A.C.-C.2
  • 16
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and rsa on 8-it cpus
    • LNCS
    • N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz,Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs. In CHES 2004, Vol. 3156, LNCS, pp.119-132.
    • (2004) CHES , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 17
    • 1542356968 scopus 로고    scopus 로고
    • The RC5 encryption algorithm: Two years on
    • Y.L. Yin, The RC5 encryption algorithm: two years on, CryptoBytes (3) 2 (Winter 1997).
    • (1997) CryptoBytes (3) 2 (Winter
    • Yin, Y.L.1
  • 19
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography based access control in sensor networks
    • H. Wang, B. Sheng, Q. Li, Elliptic curve cryptography based access control in sensor networks, Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp.127-137 (2006).
    • (2006) Int. J. Security and Networks , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.