-
1
-
-
84883421524
-
A lightweight multicast authentication mechanism for small scale IoT applications
-
Yao, X., Han, X., X., Du, X.. 2013. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications. IEEE Sensors Journal, vol. 13, no. 10, 3693-3701.
-
(2013)
IEEESensors Journal
, vol.13
, Issue.10
, pp. 3693-3701
-
-
Yao, X.1
Han, X.X.2
Du, X.3
-
3
-
-
84863061158
-
Research on mobile digital health system based on internet of things
-
Springer-Verlag
-
Li, J., Wu, X., andChen, H. 2011. Research on mobile digital health system based on internet of things, Electrical Power Systems and Computers (Lecture Notes in Electrical Engineering), vol. 99, Springer-Verlag, 495-502.
-
(2011)
Electrical Power Systems and Computers (Lecture Notes in Electrical Engineering)
, vol.99
, pp. 495-502
-
-
Li, J.1
Wu, X.2
Chen, H.3
-
4
-
-
84906496993
-
Smart Home system design based on internet of things
-
Wang, Z. 2014. Smart Home System Design Based on Internet of Things.Applied Mechanics and Materials, vols. 602-605, 3808-3812.
-
(2014)
Applied Mechanics and Materials
, vol.602-605
, pp. 3808-3812
-
-
Wang, Z.1
-
5
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R., Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266-2279.
-
(2013)
Computer Networks
, vol.57
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
6
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A. 2015. Security, Privacy and Trust in Internet of Things: The Road Ahead. Computer Networks, vol. 76, 146-164.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
7
-
-
78649576455
-
Research on security management for internet of things
-
Wang, K., Bao, J., Wu, M., and Lu, W. 2010. Research on Security Management for Internet of Things.In Proceedings of 2010 International Conference on Computer Application and System Modeling, 133-137.
-
(2010)
Proceedings of 2010 International Conference on Computer Application and System Modeling
, pp. 133-137
-
-
Wang, K.1
Bao, J.2
Wu, M.3
Lu, W.4
-
8
-
-
64849115259
-
Identities in the future Internet of Things
-
Sarma, A. and Girao, J. 2009. Identities in the future Internet of Things.Wireless Personal Communications, vol. 49, no. 3, 353-363.
-
(2009)
Wireless Personal Communications
, vol.49
, Issue.3
, pp. 353-363
-
-
Sarma, A.1
Girao, J.2
-
9
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
-
Turkanovic, M., Brumen, B., Holbl, M. 2014. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks, vol. 20, 96-112.
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Holbl, M.3
-
10
-
-
84876047651
-
A safe RFID authentication protocol for internet of things
-
Xu, D. and Chen, Y. 2013. A Safe RFID Authentication Protocol for Internet of Things.Journal of Theoretical and Applied Information Technology, vol. 48, no. 1, 359-364.
-
(2013)
Journal of Theoretical and Applied Information Technology
, vol.48
, Issue.1
, pp. 359-364
-
-
Xu, D.1
Chen, Y.2
-
11
-
-
84894059526
-
An efficient authentication and access control scheme for perception layer on internet of things
-
Ye, N., Zhu, Y., Wang, R., Malekian, R., Qiao-min, L. 2014. An Efficient Authentication and Access Control Scheme for Perception Layer on Internet of Things, Applied Mathematics & Information Sciences, vol. 8, no. 4, 1617-1624.
-
(2014)
Applied Mathematics & Information Sciences
, vol.8
, Issue.4
, pp. 1617-1624
-
-
Ye, N.1
Zhu, Y.2
Wang, R.3
Malekian, R.4
Qiao-Min, L.5
-
12
-
-
84892594888
-
Analysis of lightweight cryptographic solutions for authentication in IoT
-
Hernandez-Goya, M.C., and Caballero-Gill, P. 2013. Analysis of Lightweight Cryptographic Solutions for Authentication in IoT, InProceedings of EUROCAST 2013, Part II, LNCS 8112, 373-380.
-
(2013)
Proceedings of EUROCAST 2013, Part II, LNCS 8112
, pp. 373-380
-
-
Hernandez-Goya, M.C.1
Caballero-Gill, P.2
-
15
-
-
84928029868
-
Security analysis and improvements of authentication and access control in the internet of things
-
Ndibanje, B., Lee, H., Lee, S. 2014. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things. Sensors, vol. 14, 14786-14805.
-
(2014)
Sensors
, vol.14
, pp. 14786-14805
-
-
Ndibanje, B.1
Lee, H.2
Lee, S.3
-
16
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R. Zhou, J., Lopez, J. 2013. On the features and challenges of security and privacy in distributed internet of things, Computer Networks, vol. 57, 2266-2279.
-
(2013)
Computer Networks
, vol.57
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
17
-
-
0018545449
-
How to share a secret
-
Shamir, A. 1979. How to Share a Secret, Communications of the ACM, vol. 22, no. 11, .612-613.
-
(1979)
, Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
84960894336
-
-
NIST (FIPS 180-3) Secure Hash Standard (shs)
-
NIST, 2008. (FIPS 180-3) Secure Hash Standard (shs).
-
(2008)
-
-
-
20
-
-
84907450481
-
An efficient real-time broadcast authentication scheme for command and control messages'
-
Yavuz, A.A. 2014. An efficient real-time broadcast authentication scheme for command and control messages', IEEE Transactions on Information Forensic and Security, vol. 9, no. 10, 1733-1742.
-
(2014)
IEEETransactions on Information Forensic and Security
, vol.9
, Issue.10
, pp. 1733-1742
-
-
Yavuz, A.A.1
-
21
-
-
84866380368
-
Secure communication for smart IoT objects: Protocol STACKS, use cases and practical examples
-
Bonetto, R., Bui, N., Lakkaundi, V., Olivereau, , A., Serbanati, A., Rossi, M. 2012. Secure Communication for Smart IoT Objects: protocol STACKS, Use Cases and Practical Examples, In Proceedings of IEEE International Symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 1-7.
-
(2012)
Proceedings of IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM
, pp. 1-7
-
-
Bonetto, R.1
Bui, N.2
Lakkaundi, V.3
Olivereau, A.4
Serbanati, A.5
Rossi, M.6
-
22
-
-
84887275465
-
A lightweight RFID authentication protocol based one elliptic curve cryptography
-
Liu, Y., Qin, X., Wang, C., Li, B. 2013.A lightweight RFID authentication protocol based one elliptic curve cryptography, Journal of Computers, vol. 8, no. 11, 2880-2887.
-
(2013)
Journal of Computers
, vol.8
, Issue.11
, pp. 2880-2887
-
-
Liu, Y.1
Qin, X.2
Wang, C.3
Li, B.4
-
23
-
-
84903851734
-
A lightweight authentication protocol for internet of things
-
Lee, J-Y., Lin, W-C., Huang, Y-H. 2014. A lightweight authentication protocol for internet of things. In Proceedings of 2014 International Symposium on Next- Generation Electronics ISNE, 1-2.
-
(2014)
Proceedings of 2014 International Symposium on Next- Generation Electronics ISNE
, pp. 1-2
-
-
Lee, J.-Y.1
Lin, W.-C.2
Huang, Y.-H.3
-
24
-
-
70449491200
-
Using elliptic curves on RFID tags
-
Braun, M., Hess, E., Meyer, B. 2008. Using Elliptic Curves on RFID Tags, IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 2, 1-9.
-
(2008)
IJCSNS International Journal of Computer Science and Network Security
, vol.8
, Issue.2
, pp. 1-9
-
-
Braun, M.1
Hess, E.2
Meyer, B.3
-
25
-
-
58049152104
-
ERAP: ECC based RFID authentication protocol
-
Ahamed, S. Rahman, F., Hoque, E. 2008. ERAP: ECC based RFID Authentication Protocol, InProceedings of 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 219-225.
-
(2008)
Proceedings of 12th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 219-225
-
-
Ahamed, S.1
Rahman, F.2
Hoque, E.3
-
26
-
-
80052096133
-
A novel mutual authentication scheme for internet of things
-
Zhao, G., Si, X., Wang, J., Long, X.M and Hu, T. 2011. A Novel Mutual Authentication Scheme for Internet of Things, In Proceedings of 2011 IEEE International Conference on Modeling, Identification and Control (ICMIC), 563-566.
-
(2011)
Proceedings of 2011 IEEE International Conference on Modeling, Identification and Control (ICMIC
, pp. 563-566
-
-
Zhao, G.1
Si, X.2
Wang, J.3
Long, X.M.4
Hu, T.5
-
27
-
-
84915749742
-
Symmetric key-based authentication and the session key agreement scheme in IoT environment
-
Park, N., Kim, M., Bang, H. 2015. Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Vol. 330, 379-384.
-
(2015)
Computer Science and Its Applications, Lecture Notes in Electrical Engineering
, vol.330
, pp. 379-384
-
-
Park, N.1
Kim, M.2
Bang, H.3
-
28
-
-
84864772262
-
A communication protocol of RFID systems in internet of things
-
Gao, D., Guo, Y.G., Cui, J.Q., Hao, H.G., Shi, H. 2012. A Communication Protocol of RFID Systems in Internet of Things, International Journal of Security and its Applications, vol. 6, no. 2, 91-102.
-
(2012)
International Journal of Security and Its Applications
, vol.6
, Issue.2
, pp. 91-102
-
-
Gao, D.1
Guo, Y.G.2
Cui, J.Q.3
Hao, H.G.4
Shi, H.5
-
29
-
-
84885304488
-
DTLS based security and two-way authentication for the internet of things
-
Kothmayr, T., Schmitt, C., Hu, W., Brunig, M., Carle, G. 2013. DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks, vol. 11, no. 8, 2710-2723.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
30
-
-
85027085848
-
-
Datagram Transport Layer Seurity (DTLS) 1.2 profile for Internet o Things
-
Datagram Transport Layer Seurity (DTLS) 1.2 profile for Internet o Things', available at https://tools.ietf.org/html/draft-ietf-dice-profile-06.
-
-
-
-
31
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
Potlapally, N., Ravi, S., Raghunathan, A., Jha, N. 2003. Analyzing the Energy Consumption of Security Protocols.InProceedings of the 2003 International Symposium on Low Power Electronics and Design ISLPED' 03.
-
(2003)
Proceedings of the 2003 International Symposium on Low Power Electronics and Design ISLPED'03
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
|