-
1
-
-
52949102546
-
Secure communication in microcomputer bus systems for embedded devices
-
M. Sascha, W. Sebastian, Secure communication in microcomputer bus systems for embedded devices, J. Syst. Archit. 54 (2008) 1065-1076.
-
(2008)
J. Syst. Archit.
, vol.54
, pp. 1065-1076
-
-
Sascha, M.1
Sebastian, W.2
-
2
-
-
84962562081
-
An analysis of RFID authentication schemes for internet of things in health care environment using elliptic curve cryptography
-
H. Debiao, Z. Sherali, An analysis of RFID authentication schemes for Internet of Things in health care environment using elliptic curve cryptography, IEEE Internet Things J. 2 (1) (2015) 72-83.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.1
, pp. 72-83
-
-
Debiao, H.1
Sherali, Z.2
-
3
-
-
84901816013
-
A review on elliptic curve cryptography for embedded systems
-
A. Rahat, S.C. Mehrotra, A review on elliptic curve cryptography for embedded systems, Int. J. Comput. Sci. Inf. Technol. 3 (3) (2011) 84-103.
-
(2011)
Int. J. Comput. Sci. Inf. Technol.
, vol.3
, Issue.3
, pp. 84-103
-
-
Rahat, A.1
Mehrotra, S.C.2
-
4
-
-
84904620267
-
A secure framework for OTA smart device ecosystem using ECC encryption and biometrics
-
Springer-Verlag
-
M. Salas, A secure framework for OTA smart device ecosystem using ECC encryption and biometrics, in: Communications in Computer and Information Sciences (CCIS), Vol. 381, Springer-Verlag, 2013, pp. 204-218.
-
(2013)
Communications in Computer and Information Sciences (CCIS)
, vol.381
, pp. 204-218
-
-
Salas, M.1
-
5
-
-
77949548551
-
Embedded interaction: Interacting with the internet of things
-
M. Kranz, P. Holleis, A. Schmidt, Embedded interaction: Interacting with the Internet of Things, IEEE Internet Comput. 14 (2) (2010) 46-53.
-
(2010)
IEEE Internet Comput.
, vol.14
, Issue.2
, pp. 46-53
-
-
Kranz, M.1
Holleis, P.2
Schmidt, A.3
-
6
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, J. Netw. Comput. Appl. 34 (1) (2011) 1-11.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
7
-
-
84908645668
-
Security threats on cloud computing vulnerabilities
-
T.S. Chou, Security threats on cloud computing vulnerabilities, Int. J. Comput. Sci. Inf. Technol. 5 (3) (2013) 79-88.
-
(2013)
Int. J. Comput. Sci. Inf. Technol.
, vol.5
, Issue.3
, pp. 79-88
-
-
Chou, T.S.1
-
8
-
-
78149305944
-
-
(accessed June 2015)
-
Amazon.com, Amazon elastic compute cloud, URL: http://aws.amazon.com/ec2/ (accessed June 2015).
-
Amazon Elastic Compute Cloud
-
-
-
9
-
-
84870509974
-
-
(accessed June 2015)
-
Amazon.com, Amazon elastic block store, URL: http://aws.amazon.com/ebs/ (accessed June 2015).
-
Amazon Elastic Block Store
-
-
-
10
-
-
84876109666
-
-
(accessed June 2015)
-
Microsoft Windows Azure Platform, URL: http://www.microsoft.com/azure/default.mspx (accessed June 2015).
-
Microsoft Windows Azure Platform
-
-
-
11
-
-
78649999328
-
Case study for running hpc applications in public clouds
-
ACM
-
Q. He, S. Zhou, B. Kobler, D. Duffy, T. McGlynn, Case study for running hpc applications in public clouds, in: High Performance Distributed Computing, ACM, 2010, pp. 395-401.
-
(2010)
High Performance Distributed Computing
, pp. 395-401
-
-
He, Q.1
Zhou, S.2
Kobler, B.3
Duffy, D.4
McGlynn, T.5
-
12
-
-
78649990345
-
Seeking supernovae in the clouds: A performance study
-
ACM
-
K.R. Jackson, L. Ramakrishnan, K.J. Runge, R.C. Thomas, Seeking supernovae in the clouds: a performance study, in: High Performance Distributed Computing, ACM, 2010, pp. 421-429.
-
(2010)
High Performance Distributed Computing
, pp. 421-429
-
-
Jackson, K.R.1
Ramakrishnan, L.2
Runge, K.J.3
Thomas, R.C.4
-
13
-
-
56949095051
-
Virtual password using random linear functions for online services. ATM machines and pervasive computing
-
M. Lei, Y. Xiao, S.V. Vrbsky, C.C. Li, Virtual password using random linear functions for online services. ATM machines and pervasive computing, Comput. Comm. 31 (18) (2008) 4367-4375.
-
(2008)
Comput. Comm.
, vol.31
, Issue.18
, pp. 4367-4375
-
-
Lei, M.1
Xiao, Y.2
Vrbsky, S.V.3
Li, C.C.4
-
14
-
-
48249105468
-
Minimizing SSO effort in verifying SSL anti-phishing indicators
-
IFIP TC 11
-
Y. Wu, H. Yao, F. Bao, Minimizing SSO effort in verifying SSL anti-phishing indicators, in: International Information Security Conference, IFIP TC 11, Vol. 278, 2008, pp. 47-61.
-
(2008)
International Information Security Conference
, vol.278
, pp. 47-61
-
-
Wu, Y.1
Yao, H.2
Bao, F.3
-
15
-
-
84959880083
-
-
(accessed June 2015)
-
Microsoft Passport, 2009. Available from: http://www.passport.net/ (accessed June 2015).
-
(2009)
-
-
-
16
-
-
79953032611
-
Dynamic identity-based single password anti-phishing protocol
-
S.K. Sood, A.K. Sarje, K. Singh, Dynamic identity-based single password anti-phishing protocol, Secur. Commun. Netw. 4 (4) (2009) 418-427.
-
(2009)
Secur. Commun. Netw.
, vol.4
, Issue.4
, pp. 418-427
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
17
-
-
79956340437
-
Inverse cookie-based virtual password authentication protocol
-
S.K. Sood, A.K. Sarje, K. Singh, Inverse cookie-based virtual password authentication protocol, Int. J. Netw. Secur. 12 (3) (2011) 292-302.
-
(2011)
Int. J. Netw. Secur.
, vol.12
, Issue.3
, pp. 292-302
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
18
-
-
23144441485
-
Design and analysis of diffie-hellman based key exchange using one-time ID by SVO logic
-
K. Imamoto, K. Sakurai, Design and analysis of Diffie-Hellman based key exchange using one-time ID by SVO logic, Electron. Notes Theor. Comput. Sci. 135 (2005) 79-94.
-
(2005)
Electron. Notes Theor. Comput. Sci.
, vol.135
, pp. 79-94
-
-
Imamoto, K.1
Sakurai, K.2
-
21
-
-
28244469017
-
Analysis and improvement of authenticated key exchange protocol for sensor networks
-
X. Tian, D.S. Wong, R.W. Zhu, Analysis and improvement of authenticated key exchange protocol for sensor networks, IEEE Commun. Lett. 9 (11) (2005) 970-972.
-
(2005)
IEEE Commun. Lett.
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.S.2
Zhu, R.W.3
-
22
-
-
47849093580
-
A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
-
P.E. Abichar, A. Mhamed, B. Elhassan, A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications, in: International Conference on Next Generation Mobile Applications, Services and Technologies, 2007, pp. 235-240.
-
(2007)
International Conference on Next Generation Mobile Applications, Services and Technologies
, pp. 235-240
-
-
Abichar, P.E.1
Mhamed, A.2
Elhassan, B.3
-
23
-
-
63049116480
-
An ID based remote mutual authentication with key agreement scheme for mobile devices on elliptic curves cryptosystems
-
J.H. Yang, C.C. Chang, An ID based remote mutual authentication with key agreement scheme for mobile devices on elliptic curves cryptosystems, Comput. Secur. 28 (3-4) (2009) 138-143.
-
(2009)
Comput. Secur.
, vol.28
, Issue.3-4
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
-
24
-
-
80052774690
-
Amore efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile deviceson elliptic curve cryptosystems
-
S.K. Hafizul, G.P. Biswas, Amore efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile deviceson elliptic curve cryptosystems, J. Syst. Softw. 84 (11) (2011) 1892-1898.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1892-1898
-
-
Hafizul, S.K.1
Biswas, G.P.2
-
25
-
-
80051571433
-
A ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
H. Debiao, C. Jianhua, H. Jin, A ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Inform. Fusion 13 (3) (2012) 223-230.
-
(2012)
Inform. Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
Debiao, H.1
Jianhua, C.2
Jin, H.3
-
26
-
-
84930753105
-
Establishment of ECC based initial secrecy usable for IKE implementation
-
S. Ray, G.P. Biswas, Establishment of ECC based initial secrecy usable for IKE implementation, in: World Congress on Expert Systems, 2012, pp. 1-9.
-
(2012)
World Congress on Expert Systems
, pp. 1-9
-
-
Ray, S.1
Biswas, G.P.2
-
27
-
-
84890847807
-
End to end transport layer security for internet integrated sensing applications with ECC public-key authentication
-
J. Granjal, E. Monteiro, J. Silva, End to end transport layer security for Internet integrated sensing applications with ECC public-key authentication, in: IFIP Networking Conference, 2013, pp. 530-535.
-
(2013)
IFIP Networking Conference
, pp. 530-535
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.3
-
28
-
-
84888870405
-
EAP based group authentication and key agreement protocol for machine type communication
-
R. Jiang, C. Lai, J. Luo, X. Wang, H. Wang, EAP based group authentication and key agreement protocol for machine type communication, Int. J. Distrib. Sens. Netw. (2013) http://dx.doi.org/10.1155/2013/304601.
-
(2013)
Int. J. Distrib. Sens. Netw.
-
-
Jiang, R.1
Lai, C.2
Luo, J.3
Wang, X.4
Wang, H.5
-
29
-
-
84928806604
-
A lightweight attribute-based encryption scheme for the internet of things
-
X. Yao, Z. Chen, Y. Tian, A lightweight attribute-based encryption scheme for the Internet of Things, Future Gener. Comput. Syst. (2014) http://dx.doi.org/10.1016/j.future.2014.10.010.
-
(2014)
Future Gener. Comput. Syst.
-
-
Yao, X.1
Chen, Z.2
Tian, Y.3
-
30
-
-
84902688982
-
An elliptic curve-based mutual authentication scheme for RFID implant system
-
S.R. Moosavi, E. Nigussie, S. Virtanen, J. Isoaha, An elliptic curve-based mutual authentication scheme for RFID implant system, in: International Conference on Ambient Systems, Network and Technologies, Vol. 32, 2014, pp. 198-206.
-
(2014)
International Conference on Ambient Systems, Network and Technologies
, vol.32
, pp. 198-206
-
-
Moosavi, S.R.1
Nigussie, E.2
Virtanen, S.3
Isoaha, J.4
-
31
-
-
84899644274
-
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
-
Y.P. Liao, C.M. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks 18 (2014) 133-146.
-
(2014)
Ad Hoc Networks
, vol.18
, pp. 133-146
-
-
Liao, Y.P.1
Hsiao, C.M.2
-
32
-
-
84901188390
-
Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the internet of things notion
-
M. Turkanovic, B. Brumen, M. Holbl, Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks based on the Internet of Things notion, Ad Hoc Networks 20 (2015) 96-112.
-
(2015)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Holbl, M.3
-
33
-
-
84930763799
-
Survey on secure communication protocols for the internet of things
-
K.T. Nguyen, M. Laurent, N. Oualha, Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks 32 (2015) 17-31.
-
(2015)
Ad Hoc Networks
, vol.32
, pp. 17-31
-
-
Nguyen, K.T.1
Laurent, M.2
Oualha, N.3
-
35
-
-
84939195246
-
Calvin - Merging cloud and IoT
-
P. Persson, O. Angelsmark, Calvin - Merging cloud and IoT, in: International Conference on Ambient Systems, Network and Technologies, Vol. 52, 2015, pp. 210-217.
-
(2015)
International Conference on Ambient Systems, Network and Technologies
, vol.52
, pp. 210-217
-
-
Persson, P.1
Angelsmark, O.2
-
36
-
-
0032624280
-
Security views
-
B. Hancock, Security views, Comput. Secur. 18 (7) (1999) 553-564.
-
(1999)
Comput. Secur.
, vol.18
, Issue.7
, pp. 553-564
-
-
Hancock, B.1
-
37
-
-
0032712929
-
PKI, elliptic curve cryptography and digital signatures
-
W.J. Caelli, E.P. Dawson, S.A. Rea, PKI, elliptic curve cryptography and digital signatures, Comput. Secur. 18 (1999) 47-66.
-
(1999)
Comput. Secur.
, vol.18
, pp. 47-66
-
-
Caelli, W.J.1
Dawson, E.P.2
Rea, S.A.3
-
38
-
-
0035400713
-
Two tools for network traffic analysis
-
M. Ayedemir, L. Bottomley, M. Coffin, C. Jeffries, P. Kiessler, K. Kumar, W. Ligon, J. Marin, A. Nilsson, J. McGovern, A. Rindos, K. Vu, S. Woolet, A. Zaglou, K. Zhu, Two tools for network traffic analysis, Comput. Netw. 36 (2-3) (2001) 169-179.
-
(2001)
Comput. Netw.
, vol.36
, Issue.2-3
, pp. 169-179
-
-
Ayedemir, M.1
Bottomley, L.2
Coffin, M.3
Jeffries, C.4
Kiessler, P.5
Kumar, K.6
Ligon, W.7
Marin, J.8
Nilsson, A.9
McGovern, J.10
Rindos, A.11
Vu, K.12
Woolet, S.13
Zaglou, A.14
Zhu, K.15
-
39
-
-
33646227667
-
Automated security protocol analysis with the AVISPA tool
-
L. Vigano, Automated security protocol analysis with the AVISPA Tool, Electron. Notes Theor. Comput. Sci. 155 (2006) 61-86.
-
(2006)
Electron. Notes Theor. Comput. Sci.
, vol.155
, pp. 61-86
-
-
Vigano, L.1
-
40
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and application
-
Springer-Verlang
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Companga, J. Cuellar, P.H. Drielsma, P.C. Heam, O. Kouchnarenko, J. Mantovani, S. Modersheim, D. Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano, L. Vigneron, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Application, in: LNCS, Vol. 3576, Springer-Verlang, 2005, pp. 281-285.
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Companga, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
41
-
-
54349110300
-
An analysis of conformance issues in implementations of standardized security protocol
-
A. Izquierdo, J.M. Sierra, J. Torres, An analysis of conformance issues in implementations of standardized security protocol, Comput. Stand. Interfaces 31 (2009) 249-251.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, pp. 249-251
-
-
Izquierdo, A.1
Sierra, J.M.2
Torres, J.3
-
42
-
-
84951909718
-
A novel three-party authenticated key exchange protocol using one-time key
-
L. Chao, M. Maode, M. Jianfeng Ma, Z. Yaoyu, A novel three-party authenticated key exchange protocol using one-time key, J. Netw. Comput. Appl. 36 (2013) 298-503.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, pp. 298-503
-
-
Chao, L.1
Maode, M.2
Jianfeng Ma, M.3
Yaoyu, Z.4
|