-
1
-
-
84888862186
-
Machine-to-machine communications
-
New York, NY, USA Springer
-
Bourgeau T., Chaouchi H., Kirci P., Machine-to-machine communications. Next-Generation Wireless Technologies 2013 New York, NY, USA Springer 221 241
-
(2013)
Next-Generation Wireless Technologies
, pp. 221-241
-
-
Bourgeau, T.1
Chaouchi, H.2
Kirci, P.3
-
2
-
-
85081791648
-
-
3GPP TR 23. 888 V1. 4. 0. System Improvements for Machine-Type Communications, 2011
-
3GPP TR 23. 888 V1. 4. 0. System Improvements for Machine-Type Communications, 2011
-
-
-
-
3
-
-
84863126291
-
Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks
-
2-s2.0-84857336379 10.1109/TVT.2011.2179323
-
Deng R., Chen J., Yuen C., Cheng P., Sun Y., Energy-efficient cooperative spectrum sensing by optimal scheduling in sensor-aided cognitive radio networks. IEEE Transactions on Vehicular Technology 2012 61 2 716 725 2-s2.0-84857336379 10.1109/TVT.2011.2179323
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.2
, pp. 716-725
-
-
Deng, R.1
Chen, J.2
Yuen, C.3
Cheng, P.4
Sun, Y.5
-
4
-
-
84872043672
-
Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks
-
Cheng P., Deng R., Chen J., Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks. IEEE Wireless Communications 2012 19 6 100 105
-
(2012)
IEEE Wireless Communications
, vol.19
, Issue.6
, pp. 100-105
-
-
Cheng, P.1
Deng, R.2
Chen, J.3
-
5
-
-
79960590167
-
M2M: The Internet of 50 billion devices
-
Emmerson B., M2M: the Internet of 50 billion devices. WinWin Magazine 2010 19 22
-
(2010)
WinWin Magazine
, pp. 19-22
-
-
Emmerson, B.1
-
7
-
-
84862217559
-
Security issues on machine to machine communications
-
Lai C., Li H., Zhang Y., Cao J., Security issues on machine to machine communications. KSII Transaction on Internet and Information Systems 2012 6 2 498 514
-
(2012)
KSII Transaction on Internet and Information Systems
, vol.6
, Issue.2
, pp. 498-514
-
-
Lai, C.1
Li, H.2
Zhang, Y.3
Cao, J.4
-
8
-
-
64249083197
-
A key management protocol with robust continuity for sensor networks
-
2-s2.0-64249083197 10.1016/j.csi.2008.06.005
-
Wen M., Zheng Y.-F., Ye W.-J., Chen K.-F., Qiu W.-D., A key management protocol with robust continuity for sensor networks. Computer Standards and Interfaces 2009 31 4 642 647 2-s2.0-64249083197 10.1016/j.csi.2008.06.005
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 642-647
-
-
Wen, M.1
Zheng, Y.-F.2
Ye, W.-J.3
Chen, K.-F.4
Qiu, W.-D.5
-
9
-
-
81055124247
-
-
Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '11) September 2011 Xi'an, China 2-s2.0-81055124247 10.1109/ICSPCC.2011.6061682
-
Jiang R., Luo J., Tu F., Zhong J., LEP: a lightweight key management scheme based on ebs and polynomial for wireless sensor networks. Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '11) September 2011 Xi'an, China 1 5 2-s2.0-81055124247 10.1109/ICSPCC.2011.6061682
-
LEP: A Lightweight Key Management Scheme Based on Ebs and Polynomial for Wireless Sensor Networks
, pp. 1-5
-
-
Jiang, R.1
Luo, J.2
Tu, F.3
Zhong, J.4
-
10
-
-
79953785474
-
GRS: The green, reliability, and security of emerging machine to machine communications
-
2-s2.0-79953785474 10.1109/MCOM.2011.5741143
-
Lu R., Li X., Liang X., Shen X., Lin X., GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 2011 49 4 28 35 2-s2.0-79953785474 10.1109/MCOM.2011.5741143
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
11
-
-
84858132895
-
Machine type communications in 3GPP networks: Potential, challenges, and solutions
-
2-s2.0-84858132895 10.1109/MCOM.2012.6163599
-
Taleb T., Kunz A., Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Communications Magazine 2012 50 3 178 184 2-s2.0-84858132895 10.1109/MCOM.2012.6163599
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.3
, pp. 178-184
-
-
Taleb, T.1
Kunz, A.2
-
12
-
-
85081794542
-
-
3GPP TR 33. 868 V0. 5. 0, Security aspects of Machine-Type Communications, 2011
-
3GPP TR 33. 868 V0. 5. 0, Security aspects of Machine-Type Communications, 2011
-
-
-
-
13
-
-
84863472230
-
Knox: Privacy-preserving auditing for shared data with large groups in the cloud
-
New York, NY, USA Springer
-
Wang B., Li B., Li H., Knox: privacy-preserving auditing for shared data with large groups in the cloud. Applied Cryptography and Network Security 2012 New York, NY, USA Springer 507 525
-
(2012)
Applied Cryptography and Network Security
, pp. 507-525
-
-
Wang, B.1
Li, B.2
Li, H.3
-
16
-
-
40249105903
-
Sas-based group authentication and key agreement protocols
-
Springer
-
Laur S., Pasini S., Sas-based group authentication and key agreement protocols. Public Key Cryptography-PKC 2008 Springer 197 213
-
(2008)
Public Key Cryptography-PKC
, pp. 197-213
-
-
Laur, S.1
Pasini, S.2
-
21
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon D. P., Strong password-only authenticated key exchange. ACM SIGCOMM Computer Communication Review 1996 26 5 5 26
-
(1996)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
22
-
-
84893298807
-
-
Proceedings of the 2nd IEEE/CIC International Conference on Communications in China (ICCC '13) 2013
-
Lai C., Li H., Lu R., Shen X., Cao J., A unified end-to-end security scheme for machine-type communication in lte networks. Proceedings of the 2nd IEEE/CIC International Conference on Communications in China (ICCC '13) 2013 1 6
-
A Unified End-to-end Security Scheme for Machine-type Communication in Lte Networks
, pp. 1-6
-
-
Lai, C.1
Li, H.2
Lu, R.3
Shen, X.4
Cao, J.5
-
23
-
-
78651592040
-
An individual and group authentication model for wireless network services
-
2-s2.0-78651592040 10.4156/jcit.vol5.issue1.10
-
Ngo H. H., Wu X., Le P. D., Srinivasan B., An individual and group authentication model for wireless network services. Journal of Convergence Information Technology 2010 5 1 82 94 2-s2.0-78651592040 10.4156/jcit.vol5. issue1.10
-
(2010)
Journal of Convergence Information Technology
, vol.5
, Issue.1
, pp. 82-94
-
-
Ngo, H.H.1
Wu, X.2
Le, P.D.3
Srinivasan, B.4
-
24
-
-
84856695571
-
Group-based authentication and key agreement
-
2-s2.0-84856695571 10.1007/s11277-010-0104-7
-
Chen Y.-W., Wang J.-T., Chi K.-H., Tseng C.-C., Group-based authentication and key agreement. Wireless Personal Communications 2012 62 4 965 979 2-s2.0-84856695571 10.1007/s11277-010-0104-7
-
(2012)
Wireless Personal Communications
, vol.62
, Issue.4
, pp. 965-979
-
-
Chen, Y.-W.1
Wang, J.-T.2
Chi, K.-H.3
Tseng, C.-C.4
-
25
-
-
47049127732
-
-
Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '07) October 2007 White Plains, NY, USA 2-s2.0-47049127732 10.1109/WIMOB.2007.4390822
-
Aboudagga N., Quisquater J.-J., Eltoweissy M., Group authentication protocol for mobile networks. Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob '07) October 2007 White Plains, NY, USA 2-s2.0-47049127732 10.1109/WIMOB.2007.4390822
-
Group Authentication Protocol for Mobile Networks
-
-
Aboudagga, N.1
Quisquater, J.-J.2
Eltoweissy, M.3
-
28
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N., Elliptic curve cryptosystems. Mathematics of Computation 1987 48 177 203 209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
29
-
-
85015402934
-
-
Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer
-
Miller V. S., Use of elliptic curves in cryptography. Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer 417 426
-
Use of Elliptic Curves in Cryptography
, pp. 417-426
-
-
Miller, V.S.1
|