-
3
-
-
79953778099
-
Home M2M networks: Architectures, standards, and QoS improvement
-
Apr.
-
Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, "Home M2M networks: Architectures, standards, and QoS improvement, " IEEE Commun. Mag., vol. 49, no. 4, pp. 44-52, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 44-52
-
-
Zhang, Y.1
Yu, R.2
Xie, S.3
Yao, W.4
Xiao, Y.5
Guizani, M.6
-
4
-
-
84875055121
-
Smart grid communication: Its challenges and opportunities
-
Mar.
-
R. Ma, H.-H. Chen, Y.-R. Huang, and W. Meng, "Smart grid communication: Its challenges and opportunities, " IEEE Trans. Smart Grid, vol. 4, no. 1, pp. 36-46, Mar. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.1
, pp. 36-46
-
-
Ma, R.1
Chen, H.-H.2
Huang, Y.-R.3
Meng, W.4
-
5
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
May
-
P. McDaniel and S. McLaughlin, "Security and privacy challenges in the smart grid, " IEEE Sec. Privacy, vol. 7, no. 3, pp. 75-77, May 2009.
-
(2009)
IEEE Sec. Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
6
-
-
84953749189
-
A survey on security issues in smart grids
-
P. Jokar, N. Arianpoo, and V. C. M. Leung, "A survey on security issues in smart grids, " Sec. Commun. Netw., vol. 9, no. 3, pp. 262-273, 2016, doi: 10.1002/sec.559.
-
(2016)
Sec. Commun. Netw.
, vol.9
, Issue.3
, pp. 262-273
-
-
Jokar, P.1
Arianpoo, N.2
Leung, V.C.M.3
-
7
-
-
84913582851
-
Survey in smart grid and smart home security: Issues, challenges and countermeasures
-
Nov.
-
N. Komninos, E. Philippou, and A. Pitsillides, "Survey in smart grid and smart home security: Issues, challenges and countermeasures, " IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1933-1954, Nov. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.4
, pp. 1933-1954
-
-
Komninos, N.1
Philippou, E.2
Pitsillides, A.3
-
9
-
-
84873548235
-
Privacy in machine-to-machine communications a state-of-the-art survey
-
Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, "Privacy in machine-to-machine communications a state-of-the-art survey, " in Proc. IEEE Int. Conf. Commun. Syst. (ICCS), Nov. 2012, pp. 75-79.
-
(2012)
Proc. IEEE Int. Conf. Commun. Syst. (ICCS), Nov.
, pp. 75-79
-
-
Cheng, Y.1
Naslund, M.2
Selander, G.3
Fogelstrom, E.4
-
10
-
-
84894666219
-
Secure device pairing: A survey
-
Feb.
-
S. Mirzadeh, H. Cruickshank, and R. Tafazolli, "Secure device pairing: A survey, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 17-40, Feb. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 17-40
-
-
Mirzadeh, S.1
Cruickshank, H.2
Tafazolli, R.3
-
11
-
-
84894673236
-
M2M service platforms: Survey, issues, and enabling technologies
-
Feb.
-
J. Kim, J. Lee, J. Kim, and J. Yun, "M2M service platforms: Survey, issues, and enabling technologies, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 61-76, Feb. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 61-76
-
-
Kim, J.1
Lee, J.2
Kim, J.3
Yun, J.4
-
13
-
-
79953784283
-
M2M: From mobile to embedded Internet
-
Apr.
-
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. Johnson, "M2M: From mobile to embedded Internet, " IEEE Commun. Mag., vol. 49, no. 4, pp. 36-43, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 36-43
-
-
Wu, G.1
Talwar, S.2
Johnsson, K.3
Himayat, N.4
Johnson, K.5
-
14
-
-
84894170460
-
A survey of recent developments in home M2M networks
-
Feb.
-
M. Chen, J. Wan, S. Gonzalez, X. Liao, and V. Leung, "A survey of recent developments in home M2M networks, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 98-114, Feb. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 98-114
-
-
Chen, M.1
Wan, J.2
Gonzalez, S.3
Liao, X.4
Leung, V.5
-
15
-
-
84896479751
-
M2M communications for E-health and smart grid: An industry and standard perspective
-
Feb.
-
Z. Fan, R. Haines, and P. Kulkarni, "M2M communications for E-health and smart grid: An industry and standard perspective, " IEEE Wireless Commun., vol. 21, no. 1, pp. 62-69, Feb. 2014.
-
(2014)
IEEE Wireless Commun.
, vol.21
, Issue.1
, pp. 62-69
-
-
Fan, Z.1
Haines, R.2
Kulkarni, P.3
-
16
-
-
80052804927
-
Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications
-
A. Bartoli, M. Dohler, J. Hernández-Serrano, A. Kountouris, and D. Barthel, "Low-power low-rate goes long-range: The case for secure and cooperative machine-to-machine communications, " in Proc. Netw. Workshops, 2011, pp. 219-230.
-
(2011)
Proc. Netw. Workshops
, pp. 219-230
-
-
Bartoli, A.1
Dohler, M.2
Hernández-Serrano, J.3
Kountouris, A.4
Barthel, D.5
-
19
-
-
33748606726
-
-
RFC 5193
-
P. Jayaraman, N. Com, R. Lopez, Y. Ohba, and M. Parthasarathy, "Protocol for carrying authentication for network access (PANA) framework, " RFC 5193, 2008.
-
(2008)
Protocol for Carrying Authentication for Network Access (PANA) Framework
-
-
Jayaraman, P.1
Com, N.2
Lopez, R.3
Ohba, Y.4
Parthasarathy, M.5
-
23
-
-
79960549859
-
PriPAYD: Privacy-friendly pay-as-you-drive insurance
-
Sep./Oct.
-
C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B. Preneel, "PriPAYD: Privacy-friendly pay-as-you-drive insurance, " IEEE Trans. Dependable Secure Comput., vol. 8, no. 5, pp. 742-755, Sep./Oct. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.5
, pp. 742-755
-
-
Troncoso, C.1
Danezis, G.2
Kosta, E.3
Balasch, J.4
Preneel, B.5
-
24
-
-
82155185181
-
Estimation of achievable power capacity from plug-in electric vehicles for V2G frequency regulation: Case studies for market participation
-
Dec.
-
S. Han, S. Han, and K. Sezaki, "Estimation of achievable power capacity from plug-in electric vehicles for V2G frequency regulation: Case studies for market participation, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 632-641, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 632-641
-
-
Han, S.1
Han, S.2
Sezaki, K.3
-
25
-
-
79953792812
-
Toward intelligent machine-to-machine communications in smart grid
-
Apr.
-
Z. Fadlullah, M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki, and Y. Nozaki, "Toward intelligent machine-to-machine communications in smart grid, " IEEE Commun. Mag., vol. 49, no. 4, pp. 60-65, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 60-65
-
-
Fadlullah, Z.1
Fouda, M.2
Kato, N.3
Takeuchi, A.4
Iwasaki, N.5
Nozaki, Y.6
-
26
-
-
70249090090
-
Trust in M2M communication
-
Sep.
-
I. Cha, Y. Shah, A. Schmidt, A. Leicher, and M. Meyerstein, "Trust in M2M communication, " IEEE Veh. Technol. Mag., vol. 4, no. 3, pp. 69-75, Sep. 2009.
-
(2009)
IEEE Veh. Technol. Mag.
, vol.4
, Issue.3
, pp. 69-75
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.3
Leicher, A.4
Meyerstein, M.5
-
27
-
-
84933048120
-
The challenges facing physical layer security
-
Jun.
-
W. Trappe, "The challenges facing physical layer security, " IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 16-20
-
-
Trappe, W.1
-
28
-
-
75149129550
-
Side-channel attacks on cryptographic software
-
Nov.
-
N. Lawson, "Side-channel attacks on cryptographic software, " IEEE Sec. Privacy, vol. 7, no. 6, pp. 65-68, Nov. 2009.
-
(2009)
IEEE Sec. Privacy
, vol.7
, Issue.6
, pp. 65-68
-
-
Lawson, N.1
-
30
-
-
84919476166
-
Fool me if you can: Mimicking attacks and anti-attacks in cyberspace
-
Jan.
-
S. Yu, S. Guo, and I. Stojmenovic, "Fool me if you can: Mimicking attacks and anti-attacks in cyberspace, " IEEE Trans. Comput., vol. 64, no. 1, pp. 139-151, Jan. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.1
, pp. 139-151
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
-
32
-
-
84863918899
-
A distributed approach for secure M2M communications
-
May
-
Y. Ben Saied, A. Olivereau, and M. Laurent, "A distributed approach for secure M2M communications, " in Proc. 5th Int. Conf. New Technol. Mobility Sec. (NTMS), May 2012, pp. 1-7.
-
(2012)
Proc. 5th Int. Conf. New Technol. Mobility Sec. (NTMS)
, pp. 1-7
-
-
Ben Saied, Y.1
Olivereau, A.2
Laurent, M.3
-
33
-
-
84891591283
-
Sakes: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6l0 WPAN)
-
Jul.
-
H. Hussen, G. Tizazu, M. Ting, T. Lee, Y. Choi, and K.-H. Kim, "Sakes: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6l0 WPAN), " in Proc. 5th Int. Conf. Ubiq. Future Netw. (ICUFN), Jul. 2013, pp. 246-251.
-
(2013)
Proc. 5th Int. Conf. Ubiq. Future Netw. (ICUFN)
, pp. 246-251
-
-
Hussen, H.1
Tizazu, G.2
Ting, M.3
Lee, T.4
Choi, Y.5
Kim, K.-H.6
-
34
-
-
51249107460
-
-
RFC 4919
-
G. M. N. Kushalnagar and C. Schumacher, "IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals, " RFC 4919, 2007.
-
(2007)
IPv6 over Low-power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
-
-
Kushalnagar, G.M.N.1
Schumacher, C.2
-
35
-
-
84902282428
-
Efficient authentication and key management mechanisms for smart grid communications
-
Jun.
-
H. Nicanfar, P. Jokar, K. Beznosov, and V. Leung, "Efficient authentication and key management mechanisms for smart grid communications, " IEEE Syst. J., vol. 8, no. 2, pp. 629-640, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 629-640
-
-
Nicanfar, H.1
Jokar, P.2
Beznosov, K.3
Leung, V.4
-
36
-
-
84883438554
-
Design of a key establishment protocol for smart home energy management system
-
Jun.
-
Y. Li, "Design of a key establishment protocol for smart home energy management system, " in Proc. 5th Int. Conf. Comput. Intell. Commun. Syst. Netw. (CICSyN), Jun. 2013, pp. 88-93.
-
(2013)
Proc. 5th Int. Conf. Comput. Intell. Commun. Syst. Netw. (CICSyN)
, pp. 88-93
-
-
Li, Y.1
-
37
-
-
84858420012
-
Light-weight key distribution and management for advanced metering infrastructure
-
J. Kamto, L. Qian, J. Fuller, and J. Attia, "Light-weight key distribution and management for advanced metering infrastructure, " in Proc. IEEE GLOBECOM Workshops, Dec. 2011, pp. 1216-1220.
-
(2011)
Proc. IEEE GLOBECOM Workshops, Dec.
, pp. 1216-1220
-
-
Kamto, J.1
Qian, L.2
Fuller, J.3
Attia, J.4
-
38
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New directions in cryptography, " IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
39
-
-
84885393517
-
Key establishment and management for secure cellular machine-to-machine communication
-
Jul.
-
I. Doh, J. Lim, S. Li, and K. Chae, "Key establishment and management for secure cellular machine-to-machine communication, " in Proc. 7th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS), Jul. 2013, pp. 579-584.
-
(2013)
Proc. 7th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS)
, pp. 579-584
-
-
Doh, I.1
Lim, J.2
Li, S.3
Chae, K.4
-
40
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
-
W. Zhang and G. Cao, "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach, " in Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Mar. 2005, vol. 1, pp. 503-514.
-
(2005)
Proc. 24th Annu. Joint Conf. IEEE Comput. Commun. Soc. (INFOCOM), Mar.
, vol.1
, pp. 503-514
-
-
Zhang, W.1
Cao, G.2
-
41
-
-
84890506273
-
Energy-efficient physical layer packet authenticator for machine-to-machine networks
-
[Online]
-
A. Bartoli, J. Hernondez-Serrano, O. Leon, A. Kountouris, and D. Barthel, "Energy-efficient physical layer packet authenticator for machine-to-machine networks, " Trans. Emerging Telecommun. Technol., vol. 24, no. 4, pp. 401-412, 2013 [Online]. Available: 10.1002/ett.2653
-
(2013)
Trans. Emerging Telecommun. Technol.
, vol.24
, Issue.4
, pp. 401-412
-
-
Bartoli, A.1
Hernondez-Serrano, J.2
Leon, O.3
Kountouris, A.4
Barthel, D.5
-
42
-
-
84859813367
-
Smart grid authentication and key management for unicast and multicast communications
-
H. Nicanfar, P. Jokar, and V. Leung, "Smart grid authentication and key management for unicast and multicast communications, " in Proc. IEEE PES Innov. Smart Grid Technol. Asia (ISGT), Nov. 2011, pp. 1-8.
-
(2011)
Proc. IEEE PES Innov. Smart Grid Technol. Asia (ISGT), Nov.
, pp. 1-8
-
-
Nicanfar, H.1
Jokar, P.2
Leung, V.3
-
43
-
-
84904112065
-
A dynamic-encryption authentication scheme for M2M security in cyber-physical systems
-
S. Chen and M. Ma, "A dynamic-encryption authentication scheme for M2M security in cyber-physical systems, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 2897-2901.
-
(2013)
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec.
, pp. 2897-2901
-
-
Chen, S.1
Ma, M.2
-
44
-
-
84876059511
-
Authentication and key management for advanced metering infrastructures utilizing physically unclonable functions
-
M. Nabeel, S. Kerr, X. Ding, and E. Bertino, "Authentication and key management for advanced metering infrastructures utilizing physically unclonable functions, " in Proc. IEEE 3rd Int. Conf. Smart Grid Commun. (SmartGridComm), Nov. 2012, pp. 324-329.
-
(2012)
Proc. IEEE 3rd Int. Conf. Smart Grid Commun. (SmartGridComm), Nov.
, pp. 324-329
-
-
Nabeel, M.1
Kerr, S.2
Ding, X.3
Bertino, E.4
-
45
-
-
84904855440
-
Physical unclon-able functions and applications: A tutorial
-
Aug.
-
C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas, "Physical unclon-able functions and applications: A tutorial, " Proc. IEEE, vol. 102, no. 8, pp. 1126-1141, Aug. 2014.
-
(2014)
Proc. IEEE
, vol.102
, Issue.8
, pp. 1126-1141
-
-
Herder, C.1
Yu, M.-D.2
Koushanfar, F.3
Devadas, S.4
-
46
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum, Ed. New York, NY, USA: Springer
-
T. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing, " in Advances in Cryptology, J. Feigenbaum, Ed. New York, NY, USA: Springer, 1992, pp. 129-140.
-
(1992)
Advances in Cryptology
, pp. 129-140
-
-
Pedersen, T.1
-
47
-
-
85032873931
-
Efficient identification and signatures for smart cards
-
J.-J. Quisquater and J. Vandewalle, Eds. New York, NY, USA: Springer
-
C. Schnorr, "Efficient identification and signatures for smart cards, " in Advances in Cryptology, J.-J. Quisquater and J. Vandewalle, Eds. New York, NY, USA: Springer, 1990, pp. 688-689.
-
(1990)
Advances in Cryptology
, pp. 688-689
-
-
Schnorr, C.1
-
48
-
-
84877664366
-
A group-based authentication and key agreement for MTC in LTE networks
-
J. Cao, M. Ma, and H. Li, "A group-based authentication and key agreement for MTC in LTE networks, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012, pp. 1017-1022.
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec.
, pp. 1017-1022
-
-
Cao, J.1
Ma, M.2
Li, H.3
-
49
-
-
84936759321
-
A novel group access authentication and key agreement protocol for machine-type communication
-
C. Lai, H. Li, X. Li, and J. Cao, "A novel group access authentication and key agreement protocol for machine-type communication, " Trans. Emerging Telecommun. Technol., vol. 26, no. 3, 2015 doi: 10.1002/ett.2635.
-
(2015)
Trans. Emerging Telecommun. Technol.
, vol.26
, Issue.3
-
-
Lai, C.1
Li, H.2
Li, X.3
Cao, J.4
-
50
-
-
84904098890
-
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks
-
C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks, " in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 832-837.
-
(2013)
Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec.
, pp. 832-837
-
-
Lai, C.1
Li, H.2
Lu, R.3
Jiang, R.4
Shen, X.5
-
51
-
-
84906996398
-
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks
-
C. Lai, H. Li, R. Lu, R. Jiang, and X. Shen, "SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, " in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 1011-1016.
-
(2014)
Proc. IEEE Int. Conf. Commun. (ICC), Jun.
, pp. 1011-1016
-
-
Lai, C.1
Li, H.2
Lu, R.3
Jiang, R.4
Shen, X.5
-
52
-
-
84883108018
-
Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations
-
H. Nicanfar, S. Hosseininezhad, P. TalebiFard, and V. Leung, "Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations, " in Proc. IEEE INFOCOM, Apr. 2013, pp. 3429-3434.
-
(2013)
Proc. IEEE INFOCOM, Apr.
, pp. 3429-3434
-
-
Nicanfar, H.1
Hosseininezhad, S.2
Talebifard, P.3
Leung, V.4
-
53
-
-
84893343089
-
A new payment system for enhancing location privacy of electric vehicles
-
Jan.
-
M. H. Au, J. Liu, J. Fang, Z. Jiang, W. Susilo, and J. Zhou, "A new payment system for enhancing location privacy of electric vehicles, " IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 3-18, Jan. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.1
, pp. 3-18
-
-
Au, M.H.1
Liu, J.2
Fang, J.3
Jiang, Z.4
Susilo, W.5
Zhou, J.6
-
54
-
-
33749993205
-
Constant-size dynamic K-TAA
-
R. De Prisco and M. Yung, Eds. New York, NY, USA: Springer
-
M. Au, W. Susilo, and Y. Mu, "Constant-size dynamic K-TAA, " in Security and Cryptography for Networks, R. De Prisco and M. Yung, Eds. New York, NY, USA: Springer, 2006, pp. 111-125.
-
(2006)
Security and Cryptography for Networks
, pp. 111-125
-
-
Au, M.1
Susilo, W.2
Mu, Y.3
-
55
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems, " SIAM J. Comput., vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
56
-
-
84946418789
-
VPriv: Protecting privacy in location-based vehicular services
-
R. A. Popa, H. Balakrishnan, and A. J. Blumberg, "VPriv: Protecting privacy in location-based vehicular services, " in Proc. 18th Conf. USENIX Sec. Symp. (SSYM'09), Berkeley, CA, USA, 2009, pp. 335-350.
-
(2009)
Proc. 18th Conf. USENIX Sec. Symp. (SSYM'09), Berkeley, CA, USA
, pp. 335-350
-
-
Popa, R.A.1
Balakrishnan, H.2
Blumberg, A.J.3
-
57
-
-
84869403069
-
A group signature based electronic toll pricing system
-
Aug.
-
X. Chen, G. Lenzini, S. Mauw, and J. Pang, "A group signature based electronic toll pricing system, " in Proc. 7th Int. Conf. Availability Reliab. Sec. (ARES), Aug. 2012, pp. 85-93.
-
(2012)
Proc. 7th Int. Conf. Availability Reliab. Sec. (ARES)
, pp. 85-93
-
-
Chen, X.1
Lenzini, G.2
Mauw, S.3
Pang, J.4
-
58
-
-
84876751522
-
An enhanced measurement transmission scheme for privacy protection in smart grid
-
Jan.
-
S. Li, K. Choi, and K. Chae, "An enhanced measurement transmission scheme for privacy protection in smart grid, " in Proc. Int. Conf. Inf. Netw. (ICOIN), Jan. 2013, pp. 18-23.
-
(2013)
Proc. Int. Conf. Inf. Netw. (ICOIN)
, pp. 18-23
-
-
Li, S.1
Choi, K.2
Chae, K.3
-
59
-
-
84876479369
-
RISE: A reliable and secure scheme for wireless machine to machine communications
-
Feb.
-
W. Ren, L. Yu, L. Ma, and Y. Ren, "RISE: A reliable and secure scheme for wireless machine to machine communications, " Tsinghua Sci. Technol., vol. 18, pp. 100-117, Feb. 2013.
-
(2013)
Tsinghua Sci. Technol.
, vol.18
, pp. 100-117
-
-
Ren, W.1
Yu, L.2
Ma, L.3
Ren, Y.4
-
60
-
-
79953785474
-
GRS: The green, reliability, and security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, and security of emerging machine to machine communications, " IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.4
Lin, X.5
-
61
-
-
80051651344
-
Privacy for smart meters: Towards undetectable appliance load signatures
-
G. Kalogridis, C. Efthymiou, S. Denic, T. Lewis, and R. Cepeda, "Privacy for smart meters: Towards undetectable appliance load signatures, " in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Oct. 2010, pp. 232-237.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Oct.
, pp. 232-237
-
-
Kalogridis, G.1
Efthymiou, C.2
Denic, S.3
Lewis, T.4
Cepeda, R.5
-
63
-
-
84879812076
-
An identity based encryption using elliptic curve cryptography for secure M2M communication
-
Aug. 17-19
-
B. S. Adiga, P. Balamuralidhar, M. A. Rajan, R. Shastry, and V. L. Shivraj, "An identity based encryption using elliptic curve cryptography for secure M2M communication, " in Proc. 1st Int. Conf. Sec. Internet Things SECURIT, Kollam, India, Aug. 17-19, 2012, pp. 68-74.
-
(2012)
Proc. 1st Int. Conf. Sec. Internet Things SECURIT, Kollam, India
, pp. 68-74
-
-
Adiga, B.S.1
Balamuralidhar, P.2
Rajan, M.A.3
Shastry, R.4
Shivraj, V.L.5
-
64
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
Apr.
-
G. Frey and H.-G. Rück, "A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, " Math. Comput., vol. 62, pp. 865-874, Apr. 1994.
-
(1994)
Math. Comput.
, vol.62
, pp. 865-874
-
-
Frey, G.1
Rück, H.-G.2
-
65
-
-
84874950120
-
Securing M2M with post-quantum public-key cryptography
-
Mar.
-
J.-R. Shih et al., "Securing M2M with post-quantum public-key cryptography, " IEEE J. Emerging Sel. Topics Circuits Syst., vol. 3, no. 1, pp. 106-116, Mar. 2013.
-
(2013)
IEEE J. Emerging Sel. Topics Circuits Syst.
, vol.3
, Issue.1
, pp. 106-116
-
-
Shih, J.-R.1
-
66
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
J. Buhler, Ed. New York, NY, USA: Springer
-
J. Hoffstein, J. Pipher, and J. Silverman, "NTRU: A ring-based public key cryptosystem, " in Algorithmic Number Theory, J. Buhler, Ed. New York, NY, USA: Springer, 1998, pp. 267-288.
-
(1998)
Algorithmic Number Theory
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
67
-
-
35048900285
-
TTS: High-speed signatures on a low-cost smart card
-
M. Joye and J.-J. Quisquater, Eds. New York, NY, USA: Springer
-
B.-Y. Yang, J.-M. Chen, and Y.-H. Chen, "TTS: High-speed signatures on a low-cost smart card, " in Cryptographic Hardware and Embedded Systems, M. Joye and J.-J. Quisquater, Eds. New York, NY, USA: Springer, 2004, pp. 371-385.
-
(2004)
Cryptographic Hardware and Embedded Systems
, pp. 371-385
-
-
Yang, B.-Y.1
Chen, J.-M.2
Chen, Y.-H.3
-
68
-
-
84867728088
-
Shifting primes: Optimizing elliptic curve cryptography for smart things
-
Jul.
-
L. Marin, A. Jara, and A. Skarmeta, "Shifting primes: Optimizing elliptic curve cryptography for smart things, " in Proc. 6th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS), Jul. 2012, pp. 793-798.
-
(2012)
Proc. 6th Int. Conf. Innov. Mobile Internet Serv. Ubiq. Comput. (IMIS)
, pp. 793-798
-
-
Marin, L.1
Jara, A.2
Skarmeta, A.3
|