메뉴 건너뛰기




Volumn , Issue , 2015, Pages

One time password authentication scheme based on elliptic curves for Internet of Things (IoT)

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; AUTOMATION; GEOMETRY; INTELLIGENT BUILDINGS; INTERNET; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84964007916     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSITNSW.2015.7176384     Document Type: Conference Paper
Times cited : (127)

References (27)
  • 1
    • 84886881239 scopus 로고    scopus 로고
    • The internet of everything through ipv6: An analysis of challenges, solutions and opportunities
    • ser. JoWUA 13. Innovative Information Science & Technology Research Group
    • J. Antonio J, L. Latif, and S. Antonio, "The internet of everything through ipv6: An analysis of challenges, solutions and opportunities, " in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, ser. JoWUA 13. Innovative Information Science & Technology Research Group, 2013, pp. 97-118.
    • (2013) Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications , pp. 97-118
    • Antonio, J.J.1    Latif, L.2    Antonio, S.3
  • 6
    • 84964089534 scopus 로고    scopus 로고
    • Directed path based authentication scheme for the internet of things
    • N. Huansheng and L. Hong, "Directed path based authentication scheme for the internet of things, " in Journal of Universal Computer Science, 2012, pp. 1112-11 131.
    • (2012) Journal of Universal Computer Science , vol.131 , pp. 1112-1211
    • Huansheng, N.1    Hong, L.2
  • 11
    • 84964089490 scopus 로고    scopus 로고
    • Novel threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot
    • M. Parikshit N, A. Bayu, P. Neeli R, and P. Ramjee, "Novel threshold cryptography-based group authentication (tcga) scheme for the internet of things (iot), " in 7th IEEE ANTS. IEEE, 2013, pp. 1-6.
    • (2013) 7th IEEE ANTS. IEEE , pp. 1-6
    • Parikshit, N.M.1    Bayu, A.2    Neeli, R.P.3    Ramjee, P.4
  • 17
    • 0000552770 scopus 로고    scopus 로고
    • Twenty years of attacks on the rsa cryptosystem
    • D. Boneh, "Twenty years of attacks on the rsa cryptosystem, " in Notices of the AMS, ser. AMS99. AMS, 1999, pp. 1-16.
    • (1999) Notices of the AMS, Ser. AMS99. AMS , pp. 1-16
    • Boneh, D.1
  • 21
    • 84964055603 scopus 로고    scopus 로고
    • On the security of hmac and nmac based on haval, md4, md5, sha-0 and sha-1
    • Springer-Verlag
    • K. Jongsung, B. Alex, P. Bart, and H. Seokhie, "On the security of hmac and nmac based on haval, md4, md5, sha-0 and sha-1, " in SCN 2006. LNCS, Springer-Verlag, 2006, pp. 1-18.
    • (2006) SCN, 2006, LNCS , pp. 1-18
    • Jongsung, K.1    Alex, B.2    Bart, P.3    Seokhie, H.4
  • 22
    • 84964021916 scopus 로고    scopus 로고
    • Full key-recovery attacks on hmac/nmacmd4 and nmac-md5
    • Springer, Dec, F.P.A. G.L. N.P.Q.
    • F. P.A., L. G, and N. P.Q, "Full key-recovery attacks on hmac/nmacmd4 and nmac-md5, " in CRYPTO 07. Springer, Dec 2007, pp. 1-18.
    • (2007) CRYPTO 07 , pp. 1-18
  • 24
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • NewYork, NY, USA: Springer-Verlag New York, Inc
    • A. Shamir, "Identity-based cryptosystems and signature schemes, " in Proceedings of CRYPTO 84 on Advances in Cryptology. NewYork, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 25
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Ser. LNCS01 Springer, 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " in CRYPTO 2001, ser. LNCS01. Springer, 2001, pp. 213-229.
    • CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.