-
1
-
-
84886881239
-
The internet of everything through ipv6: An analysis of challenges, solutions and opportunities
-
ser. JoWUA 13. Innovative Information Science & Technology Research Group
-
J. Antonio J, L. Latif, and S. Antonio, "The internet of everything through ipv6: An analysis of challenges, solutions and opportunities, " in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ser. JoWUA 13. Innovative Information Science & Technology Research Group, 2013, pp. 97-118.
-
(2013)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, pp. 97-118
-
-
Antonio, J.J.1
Latif, L.2
Antonio, S.3
-
2
-
-
84964010565
-
Security considerations in the IP-based internet of things
-
G.-M. Oscar, K. Sandeep S, H. Sye, Loong Keoh Rene, and S. Rene, "Security considerations in the ip-based internet of things, " in IETF Draft-garcia-core-security-06, ser. Internet Draft 14. IETF, 2014, pp. 1-45.
-
(2014)
IETF Draft-garcia-core-security-06, Ser. Internet Draft 14. IETF
, pp. 1-45
-
-
Oscar, G.-M.1
Sandeep, S.K.2
Sye, H.3
Keoh Rene, L.4
Rene, S.5
-
3
-
-
33646417370
-
Secure internet banking authentication
-
A. Hiltgen, T. Kramp, and T. Weigold, "Secure internet banking authentication, " in IEEE Security and Privacy, 2006, pp. 21-29.
-
(2006)
IEEE Security and Privacy
, pp. 21-29
-
-
Hiltgen, A.1
Kramp, T.2
Weigold, T.3
-
4
-
-
84964087148
-
Identity authentication and capability based access control (iacac) for the internet of things
-
M. Parikshit N, A. Bayu, P. Neeli R, and P. Ramjee, "Identity authentication and capability based access control (iacac) for the internet of things, " in Journal of River Publications. River Publishers, 2013, pp. 1-40.
-
(2013)
Journal of River Publications. River Publishers
, pp. 1-40
-
-
Parikshit, N.M.1
Bayu, A.2
Neeli, R.P.3
Ramjee, P.4
-
5
-
-
84964089496
-
The novel authentication scheme based on theory of quadratic residues for wireless sensor networks
-
L. Chen-Xu, L. Yun, Z. Zhen-Jiang, and C. Zi-Yao, "The novel authentication scheme based on theory of quadratic residues for wireless sensor networks, " in International Journal of Distributed Sensor Networks. Hindawi, 2013.
-
(2013)
International Journal of Distributed Sensor Networks. Hindawi
-
-
Chen-Xu, L.1
Yun, L.2
Zhen-Jiang, Z.3
Zi-Yao, C.4
-
6
-
-
84964089534
-
Directed path based authentication scheme for the internet of things
-
N. Huansheng and L. Hong, "Directed path based authentication scheme for the internet of things, " in Journal of Universal Computer Science, 2012, pp. 1112-11 131.
-
(2012)
Journal of Universal Computer Science
, vol.131
, pp. 1112-1211
-
-
Huansheng, N.1
Hong, L.2
-
8
-
-
0019634370
-
Password authentication with insecure communication
-
L. Leslie, "Password authentication with insecure communication, " in Communications of the ACM, ser. J. UCS 12. New York, NY, USA: ACM, 2012, pp. 770-772.
-
(2012)
Communications of The. ACM, Ser. J. UCS 12. New York, NY, USA: ACM
, pp. 770-772
-
-
Leslie, L.1
-
9
-
-
80052096133
-
A novel mutual authentication scheme for internet of things
-
June 2011
-
G. Zhao, X. Si, J. Wang, X. Long, and T. Hu, "A novel mutual authentication scheme for internet of things, " in Modelling, Identification and Control (ICMIC), Proceedings of 2011 International Conference on, June 2011, pp. 563-566.
-
Modelling, Identification and Control (ICMIC), Proceedings of 2011 International Conference on
, pp. 563-566
-
-
Zhao, G.1
Si, X.2
Wang, J.3
Long, X.4
Hu, T.5
-
10
-
-
84867629770
-
Ibake: Identity-based authenticated key exchange
-
V. Cakulev, G. Sundaram, and I. Broustis, "Ibake: Identity-based authenticated key exchange, " in RFC 6539, ser. Informational 12. IETF, 2012, pp. 1-13.
-
(2012)
RFC 6539, Ser. Informational 12. IETF
, pp. 1-13
-
-
Cakulev, V.1
Sundaram, G.2
Broustis, I.3
-
11
-
-
84964089490
-
Novel threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot
-
M. Parikshit N, A. Bayu, P. Neeli R, and P. Ramjee, "Novel threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot), " in 7th IEEE ANTS. IEEE, 2013, pp. 1-6.
-
(2013)
7th IEEE ANTS. IEEE
, pp. 1-6
-
-
Parikshit, N.M.1
Bayu, A.2
Neeli, R.P.3
Ramjee, P.4
-
12
-
-
33749567312
-
Hotp: An hmac-based onetime password algorithm
-
D. MRaihi, S. Machani, and J. Rydell, "Hotp: An hmac-based onetime password algorithm, " in IETF RFC 4226, ser. Network Working Group 05. IETF, 2005, pp. 1-37.
-
(2005)
IETF RFC 4226, Ser. Network Working Group 05. IETF
, pp. 1-37
-
-
Raihi, D.M.1
Machani, S.2
Rydell, J.3
-
13
-
-
44349140199
-
Totp:time-based one-Time password algorithm
-
D. MRaihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen, "Totp:time-based one-Time password algorithm, " in IETF RFC 6238, ser. Informational 11. IETF, 2011, pp. 1-16.
-
(2011)
IETF RFC 6238, Ser. Informational 11. IETF
, pp. 1-16
-
-
Raihi, D.M.1
Bellare, M.2
Hoornaert, F.3
Naccache, D.4
Ranen, O.5
-
14
-
-
84869495813
-
Weaknesses and improvements of a one-Time password
-
K. Mijin, L. Byunghee, K. Seungjoo, and W. Dongho, "Weaknesses and improvements of a one-Time password, " in International Journal of Future Generation Communication and Networking, 2009, pp. 29-38.
-
(2009)
International Journal of Future Generation Communication and Networking
, pp. 29-38
-
-
Mijin, K.1
Byunghee, L.2
Seungjoo, K.3
Dongho, W.4
-
15
-
-
84923068631
-
-
Elsevier
-
Y. Huang, Z. Huang, H. Zhao, and X. Lai, "A new one-Time password method, " vol. 4. Elsevier, 2013, pp. 32-37.
-
(2013)
A new one-Time password method
, vol.4
, pp. 32-37
-
-
Huang, Y.1
Huang, Z.2
Zhao, H.3
Lai, X.4
-
16
-
-
78650791068
-
Onetime password system with infinite nested hash chains
-
Springer
-
E. Mohamed Hamdy, K. Muhammad Khurram, and A. Khaled, "Onetime password system with infinite nested hash chains, " in Communications in Computer and Information Science, ser. Security Technology, Disaster Recovery and Business Continuity Book Chapter05. Springer, 2005, pp. 161-170.
-
(2005)
Communications in Computer and Information Science, Ser. Security Technology, Disaster Recovery and Business Continuity Book Chapter05
, pp. 161-170
-
-
Mohamed Hamdy, E.1
Muhammad Khurram, K.2
Khaled, A.3
-
17
-
-
0000552770
-
Twenty years of attacks on the rsa cryptosystem
-
D. Boneh, "Twenty years of attacks on the rsa cryptosystem, " in Notices of the AMS, ser. AMS99. AMS, 1999, pp. 1-16.
-
(1999)
Notices of the AMS, Ser. AMS99. AMS
, pp. 1-16
-
-
Boneh, D.1
-
19
-
-
24744439249
-
The n/r one time password system
-
IEEE
-
V. Goyal, A. Abraham, S. Sanyal, and S. Han, "The n/r one time password system, " in Proceedings of International Conference on Information Technology: Coding and Computing, ser. ITCC05. IEEE, 2005, pp. 733-738.
-
(2005)
Proceedings of International Conference on Information Technology: Coding and Computing, Ser. ITCC05
, pp. 733-738
-
-
Goyal, V.1
Abraham, A.2
Sanyal, S.3
Han, S.4
-
20
-
-
77956446366
-
Cryptanalysis on hmac/nmac-md5 and md5-mac
-
Springer
-
X. Wang, H. Yu, W. Wang, H. Zhang, and T. Zhan, "Cryptanalysis on hmac/nmac-md5 and md5-mac, " in Advances in cryptology-EUROCRYPT 2009. Springer, 2009, pp. 121-133.
-
(2009)
Advances in Cryptology-EUROCRYPT
, vol.2009
, pp. 121-133
-
-
Wang, X.1
Yu, H.2
Wang, W.3
Zhang, H.4
Zhan, T.5
-
21
-
-
84964055603
-
On the security of hmac and nmac based on haval, md4, md5, sha-0 and sha-1
-
Springer-Verlag
-
K. Jongsung, B. Alex, P. Bart, and H. Seokhie, "On the security of hmac and nmac based on haval, md4, md5, sha-0 and sha-1, " in SCN 2006. LNCS, Springer-Verlag, 2006, pp. 1-18.
-
(2006)
SCN, 2006, LNCS
, pp. 1-18
-
-
Jongsung, K.1
Alex, B.2
Bart, P.3
Seokhie, H.4
-
22
-
-
84964021916
-
Full key-recovery attacks on hmac/nmacmd4 and nmac-md5
-
Springer, Dec, F.P.A. G.L. N.P.Q.
-
F. P.A., L. G, and N. P.Q, "Full key-recovery attacks on hmac/nmacmd4 and nmac-md5, " in CRYPTO 07. Springer, Dec 2007, pp. 1-18.
-
(2007)
CRYPTO 07
, pp. 1-18
-
-
-
24
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
NewYork, NY, USA: Springer-Verlag New York, Inc
-
A. Shamir, "Identity-based cryptosystems and signature schemes, " in Proceedings of CRYPTO 84 on Advances in Cryptology. NewYork, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
25
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Ser. LNCS01 Springer, 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " in CRYPTO 2001, ser. LNCS01. Springer, 2001, pp. 213-229.
-
CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
26
-
-
84901044821
-
Lightweight ibe scheme for wireless sensor nodes
-
B. S. Adiga, M. A. Rajan, R. Shastry, V. L. Shivraj, and P. Balamuralidhar, "Lightweight ibe scheme for wireless sensor nodes, " in Advanced Networks and Telecommuncations Systems (ANTS). IEEE, Dec 2013, pp. 1-6.
-
(2013)
Advanced Networks and Telecommuncations Systems (ANTS) IEEE, Dec
, pp. 1-6
-
-
Adiga, B.S.1
Rajan, M.A.2
Shastry, R.3
Shivraj, V.L.4
Balamuralidhar, P.5
|