메뉴 건너뛰기




Volumn 61, Issue 1, 2015, Pages 56-62

Secure pseudonym-based near field communication protocol for the consumer internet of things

Author keywords

identity based public key cryptography; impersonation attack; Near field communication; security protocol

Indexed keywords

CONSUMER ELECTRONICS; DATA PRIVACY; INTERNET OF THINGS; INTERNET PROTOCOLS; MOBILE SECURITY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84926037301     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2015.7064111     Document Type: Article
Times cited : (30)

References (18)
  • 1
    • 84926055211 scopus 로고    scopus 로고
    • Market Insight: The Outlook on Mobile Payment
    • May
    • Gartner, "Market Insight: The Outlook on Mobile Payment," Market Analysis and Statistics, May 2010.
    • (2010) Market Analysis and Statistics
    • Gartner1
  • 9
    • 82755161820 scopus 로고    scopus 로고
    • Securing mobile network prefix provisioning for NEMO based vehicular networks
    • Jan.
    • J.-H. Lee, J. Chen, and T. Ernst, "Securing mobile network prefix provisioning for NEMO based vehicular networks," Mathematical and Computer Modelling, vol. 55, No. 1, pp. 170-187, Jan. 2012.
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.1 , pp. 170-187
    • Lee, J.-H.1    Chen, J.2    Ernst, T.3
  • 11
    • 80052372468 scopus 로고    scopus 로고
    • PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs
    • Sept.
    • D. Huang, S. Misra, M. Verma, and G.Xue, "PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs," IEEE Transactions on Intelligent Transportation Systems, Vol. 12, No. 3, pp. 736-746, Sept. 2011.
    • (2011) IEEE Transactions on Intelligent Transportation Systems , vol.12 , Issue.3 , pp. 736-746
    • Huang, D.1    Misra, S.2    Verma, M.3    Xue, G.4
  • 12
    • 84876136714 scopus 로고    scopus 로고
    • Conditional privacy preserving security protocol for NFC applications
    • H. Eun, H. Lee, H. Oh, Conditional privacy preserving security protocol for NFC applications, IEEE Trans. Consum. Electron., vol. 59, no. 1, pp.153-160, 2013.
    • (2013) IEEE Trans. Consum. Electron. , vol.59 , Issue.1 , pp. 153-160
    • Eun, H.1    Lee, H.2    Oh, H.3
  • 13
    • 84891688392 scopus 로고    scopus 로고
    • Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks
    • D. He, N. Kumar and J.-H. Lee, "Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks," IEEE Trans. Consum. Electron., vol. 59, no. 4, pp. 811-817, 2013.
    • (2013) IEEE Trans. Consum. Electron. , vol.59 , Issue.4 , pp. 811-817
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 14
    • 84895056653 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
    • D. He, Y. Zhang, J. Chen, "Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks,"Wireless Personal Communications, vol. 74, no. 2, pp. 229-243, 2014.
    • (2014) Wireless Personal Communications , vol.74 , Issue.2 , pp. 229-243
    • He, D.1    Zhang, Y.2    Chen, J.3
  • 15
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • D. He and D. Wang, "Robust biometrics-based authentication scheme for multi-server environment," IEEE Systems Journal, DOI: 10.1109/JSYST.2014.2301517, 2014.
    • (2014) IEEE Systems Journal
    • He, D.1    Wang, D.2
  • 16
    • 84876151110 scopus 로고    scopus 로고
    • Security flaws in a smart card based authentication scheme for multi-server environment
    • D. He, S. Wu, "Security flaws in a smart card based authentication scheme for multi-server environment," Wireless Personal Communications, vol. 70, no. 1, pp. 323-329, 2013.
    • (2013) Wireless Personal Communications , vol.70 , Issue.1 , pp. 323-329
    • He, D.1    Wu, S.2
  • 17
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced Three-factor Security Protocol for USB Consumer Storage Devices
    • D. He, N. Kumar, J.-H. Lee, R. Sherratt, "Enhanced Three-factor Security Protocol for USB Consumer Storage Devices, " IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30-37, 2014.
    • (2014) IEEE Trans. Consum. Electron. , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3    Sherratt, R.4
  • 18
    • 84894255457 scopus 로고    scopus 로고
    • An Enhanced Access Control Scheme in Wireless Sensor Networks
    • S. Chatterjee, A. K. Das and J. K. Sing, "An Enhanced Access Control Scheme in Wireless Sensor Networks," Ad Hoc & Sen Wireless Networks, Vol. 21, No. 1-2, pp. 121-149, 2014.
    • (2014) Ad Hoc & Sen Wireless Networks , vol.21 , Issue.1-2 , pp. 121-149
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.