-
3
-
-
84964007916
-
One time password authentication scheme based on elliptic curves for Internet of Things (IoT)
-
KSA
-
Shivraj, V. L., M. A. Rajan, Meena Singh, and P. Balamuralidhar. "One time password authentication scheme based on elliptic curves for Internet of Things (IoT)". In IEEE 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW 2015), pp. 1-6. KSA, 2015.
-
(2015)
IEEE 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW 2015)
, pp. 1-6
-
-
Shivraj, V.L.1
Rajan, M.A.2
Singh, M.3
Balamuralidhar, P.4
-
4
-
-
84945287122
-
Method for secure RESTful web service
-
Las Vegas-USA
-
Sungchul L., Ju-Yeon J. and Yoohwan K., "Method for secure RESTful web service". In IEEE/ACIS, 14th International Conference on Computer and Information Science (ICIS 2015), pp. 77-81. Las Vegas-USA, 2015
-
(2015)
IEEE/ACIS, 14th International Conference on Computer and Information Science (ICIS 2015)
, pp. 77-81
-
-
Sungchul, L.1
Ju-Yeon, J.2
Yoohwan, K.3
-
7
-
-
0018545449
-
How to share a secret
-
A. Shamir, '"How to share a secret," Commun ACM, vol. 22, no. 11, pp. 612-613.
-
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
8
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
Turkanović, M., Brumen, B., & Hölbl, M. "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion". Ad Hoc Networks, 2014, vol. 20, 96-112.
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanović, M.1
Brumen, B.2
Hölbl, M.3
-
10
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker and J. Turner, '"Open Flow: enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74.
-
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
11
-
-
84933051719
-
Softwaredefined networking security: Pros and cons
-
M. Dabbagh, B. Hamdaoui, M. Guizani and A. Rayes, '"Softwaredefined networking security: pros and cons," Communications Magazine, IEEE, vol. 53, no. 6, pp. 73-79.
-
Communications Magazine, IEEE
, vol.53
, Issue.6
, pp. 73-79
-
-
Dabbagh, M.1
Hamdaoui, B.2
Guizani, M.3
Rayes, A.4
-
14
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
-
M.S. Farash, M. Turkanović, S. Kumari and M. Hölbl, '"An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment," Ad Hoc Networks, vol. 36, Part 1, 1, pp. 152-176.
-
Ad Hoc Networks
, vol.36
, Issue.1
, pp. 152-176
-
-
Farash, M.S.1
Turkanović, M.2
Kumari, S.3
Hölbl, M.4
|