-
3
-
-
74949143896
-
Internet of Things-New security and privacy challenges
-
R. H. Weber. Internet of Things-New security and privacy challenges. Computer Law and Security Review, 26, 23-30 (2010).
-
(2010)
Computer Law and Security Review
, vol.26
, pp. 23-30
-
-
Weber, R.H.1
-
4
-
-
80052096133
-
A novel mutual authentication scheme for Internet of Things
-
Shanghai, China
-
G. Zhao, X. Si, J.Wang, et al. A novel mutual authentication scheme for Internet of Things. In Proc. Modelling, Identification and Control (ICMIC), Shanghai, China, 563-566 (2011).
-
(2011)
In Proc. Modelling, Identification and Control (ICMIC)
, pp. 563-566
-
-
Zhao, G.1
Si, X.2
Wang, J.3
-
6
-
-
79953065589
-
An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
-
X. H. Le,M. Khalid, R. Sankar, et al. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks, 6, 355-364 (2011).
-
(2011)
Journal of Networks
, vol.6
, pp. 355-364
-
-
Le, X.H.1
Khalid, M.2
Sankar, R.3
-
8
-
-
35248822770
-
Symmetric key based authenticated querying in wireless sensor networks
-
ACM, New York, NY, USA
-
S. Banerjee, D. Mukhopadhyay. Symmetric key based authenticated querying in wireless sensor networks. In Proc. first Int. Integrated internet ad hoc and sensor networks.ACM, New York, NY, USA, 1223-1227 (2006).
-
(2006)
In Proc. first Int. Integrated internet ad hoc and sensor networks
, pp. 1223-1227
-
-
Banerjee, S.1
Mukhopadhyay, D.2
-
9
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan,A. Perrig. Security and privacy in sensor networks. Computer, 36, 103-105 (2003).
-
(2003)
Computer
, vol.36
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
10
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Global Telecommunications, Washington, DC
-
H. R. Tseng, R. H. Jan,W. Yang. An improved dynamic user authentication scheme for wireless sensor networks. In Proc. IEEE Conf. Global Telecommunications, Washington, DC, 986-990 (2007).
-
(2007)
In Proc. IEEE Conf
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
12
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography
-
H. L. Yeh, T. H. Chen, P. C. Liu, et al. A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography, Sensors, 11, 4767-4779 (2011).
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
-
13
-
-
55849115257
-
A novel access control protocol for secure sensor networks
-
H. F. Huang. A novel access control protocol for secure sensor networks. Computer Standards and Interfaces, 31, 272-276 (2009).
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 272-276
-
-
Huang, H.F.1
-
14
-
-
77955351360
-
An attribute and role based access control model for service-oriented environment
-
Xuzhou, Chinese
-
Y. Wei, C. Shi, W. Shao. An attribute and role based access control model for service-oriented environment. In Proc. IEEE Conf. Control and Decision (CCDC), Xuzhou, Chinese, 4451-4455 (2010).
-
(2010)
In Proc. IEEE Conf. Control and Decision (CCDC)
, pp. 4451-4455
-
-
Wei, Y.1
Shi, C.2
Shao, W.3
-
15
-
-
84858193897
-
The privacy-aware access control system using attribute-and role-based access control in private cloud
-
Shenzhen
-
E. Mon, T. T. Naing. The privacy-aware access control system using attribute-and role-based access control in private cloud. In Proc. IEEE Int. Conf. Broadband Network and Multimedia Technology, Shenzhen, 447-451 (2011).
-
(2011)
In Proc. IEEE Int. Conf. Broadband Network and Multimedia Technology
, pp. 447-451
-
-
Mon, E.1
Naing, T.T.2
-
17
-
-
78650436845
-
An extended role based access control model for the Internet of Things
-
G. Zhang, J. Tian. An extended role based access control model for the Internet of Things. In Proc. ICINA, Kunming, V1-319 (2010).
-
(2010)
In Proc. ICINA, Kunming
-
-
Zhang, G.1
Tian, J.2
-
18
-
-
84894025341
-
An Authorization Management Approach in the Internet of Things
-
Q. Han, J. Li. An Authorization Management Approach in the Internet of Things, (2012).
-
(2012)
-
-
Han, Q.1
Li, J.2
-
19
-
-
84873426135
-
Identity establishment and capability based access control (IECAC) scheme for Internet of Things
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things. In Proc.15th Int. WPMC, Taipei, 187-191 (2012).
-
(2012)
In Proc.15th Int. WPMC, Taipei
, pp. 187-191
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
-
20
-
-
77954732460
-
On the security of an enhanced novel access control protocol for wireless sensor networks
-
P. Zeng, K. K. R. Choo, D. Z. Sun. On the security of an enhanced novel access control protocol for wireless sensor networks. IEEE Transactions on Consumer Electronics, 56, 566-569 (2010).
-
(2010)
IEEE Transactions on Consumer Electronics
, vol.56
, pp. 566-569
-
-
Zeng, P.1
Choo, K.K.R.2
Sun, D.Z.3
-
21
-
-
79953104473
-
BABAC: An access control framework for network virtualization using user behaviors and attributes
-
Physical and Social Computing, Washington, DC, USA
-
Y. Che, Q. Yang, C. Wu, et al. BABAC: An access control framework for network virtualization using user behaviors and attributes. In Proc. IEEE/ACM Int. Conf. Green Computing and Communications and Int. Conf. Cyber, Physical and Social Computing, Washington, DC, USA, 747-754 (2010).
-
(2010)
In Proc. IEEE/ACM Int. Conf. Green Computing and Communications and Int. Conf. Cyber
, pp. 747-754
-
-
Che, Y.1
Yang, Q.2
Wu, C.3
|