메뉴 건너뛰기




Volumn 8112 LNCS, Issue PART 2, 2013, Pages 373-380

Analysis of lightweight cryptographic solutions for authentication in IoT

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; CRYPTOGRAPHY; SYSTEM THEORY;

EID: 84892594888     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-53862-9_48     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 1
    • 84858313069 scopus 로고    scopus 로고
    • Verifying worst case delays in controller area network
    • Schmitt, J.B. (ed.) Springer, Heidelberg
    • Ivkovic, N., Kresic, D., Hielscher, K.-S., German, R.: Verifying worst case delays in controller area network. In: Schmitt, J.B. (ed.) MMB & DFT 2012. LNCS, vol. 7201, pp. 91-105. Springer, Heidelberg (2012), http://dx.doi.org/10.1007/978-3-642-28540-0-26
    • (2012) MMB & DFT 2012. LNCS , vol.7201 , pp. 91-105
    • Ivkovic, N.1    Kresic, D.2    Hielscher, K.-S.3    German, R.4
  • 2
    • 77957599265 scopus 로고    scopus 로고
    • Proposed security model and threat taxonomy for the internet of things (IoT)
    • Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) Springer, Heidelberg
    • Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the internet of things (IoT). In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 420-429. Springer, Heidelberg (2010)
    • (2010) CNSA 2010. CCIS , vol.89 , pp. 420-429
    • Babar, S.1    Mahalle, P.2    Stango, A.3    Prasad, N.4    Prasad, R.5
  • 7
    • 74549171504 scopus 로고    scopus 로고
    • Rfid authentication protocols based on elliptic curves-A top-down evaluation survey
    • Fernández-Medina, E., Malek, M., Hernando, J. (eds.) INSTICC Press
    • Hutter, M.: Rfid authentication protocols based on elliptic curves-a top-down evaluation survey. In: Fernández-Medina, E., Malek, M., Hernando, J. (eds.) SE-CRYPT, pp. 101-110. INSTICC Press (2009)
    • (2009) SE-CRYPT , pp. 101-110
    • Hutter, M.1
  • 9
    • 78650114205 scopus 로고    scopus 로고
    • A lightweight implementation of keccak hash function for radio-frequency identification applications
    • Ors Yalcin, S.B. (ed.) Springer, Heidelberg
    • Kavun, E.B., Yalcin, T.: A lightweight implementation of keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258-269. Springer, Heidelberg (2010)
    • (2010) RFIDSec 2010. LNCS , vol.6370 , pp. 258-269
    • Kavun, E.B.1    Yalcin, T.2
  • 10
    • 80455155201 scopus 로고    scopus 로고
    • Zero-knowledge authentication protocol based on alternative mode in rfid systems
    • December)
    • Liu, H., Ning, H.: Zero-knowledge authentication protocol based on alternative mode in rfid systems. IEEE Sensors Journal 11(12), 3235-3245 (December)
    • IEEE Sensors Journal , vol.11 , Issue.12 , pp. 3235-3245
    • Liu, H.1    Ning, H.2
  • 11
    • 80054693529 scopus 로고    scopus 로고
    • Using zero knowledge to share a little knowledge: Bootstrapping trust in device networks
    • Défago, X., Petit, F., Villain, V. (eds.) Springer, Heidelberg
    • Ramzy, I., Arora, A.: Using zero knowledge to share a little knowledge: Bootstrapping trust in device networks. In: Défago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 371-385. Springer, Heidelberg (2011)
    • (2011) SSS 2011. LNCS , vol.6976 , pp. 371-385
    • Ramzy, I.1    Arora, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.