-
1
-
-
77950347409
-
'A view of cloud computing,'
-
Apr
-
M. Armbrust, A. Fox, R. Griffith, et al., "A view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, Apr. 2010
-
(2010)
Communications of the ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
-
2
-
-
84991776349
-
-
Symposium on Network and Distributed Systems Security
-
D. Balfanz, D. K Smetters, P. Stewart and H. C. Wong, "Talking to strangers: Authentication in adhoc wireless networks," in Symposium on Network and Distributed Systems Security, 2002
-
(2002)
'Talking to strangers: Authentication in adhoc wireless networks,'
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
3
-
-
84866627419
-
Fog computing and its role in the internet of things
-
New York, USA
-
F. Bonomi, R. Milito, J. Zhu and S. Addepalli, "Fog computing and its role in the internet of things," in Proceedings of the First Edition of the ACM Workshop on Mobile Cloud Computing, pp. 13-16, New York, USA, 2012
-
(2012)
Proceedings of the First Edition of the ACM Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
4
-
-
84903835491
-
Cloudlets authentication in NFCbased mobile computing
-
S. Bouzefrane, B. Mostefa, F. Amira, F. Houacine and H. Cagnon, "Cloudlets authentication in NFCbased mobile computing," in 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 267-272, 2014
-
(2014)
2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
, pp. 267-272
-
-
Bouzefrane, S.1
Mostefa, B.2
Amira, F.3
Houacine, F.4
Cagnon, H.5
-
6
-
-
0000523051
-
A logic of authentication
-
The Royal Society
-
M. Burrows, M. Abadi and R. M. Needham, "A logic of authentication," in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 426, pp. 233-271, The Royal Society, 1989
-
(1989)
Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
7
-
-
0038011186
-
A reputationbased approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, D. Capitani D. Vimercati, S. Paraboschi, P. Samarati and F. Violante, "A reputationbased approach for choosing reliable resources in peer-to-peer networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 207-216, 2002
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Capitani, D.2
Vimercati, D.3
Paraboschi, S.4
Samarati, P.5
Violante, F.6
-
8
-
-
79953792812
-
Toward intelligent machine-to-machine communications in smart grid
-
Z. M. Fadlullah, M. M. Fouda, N. Kato, A. Takeuchi, N. Iwasaki and Y. Nozaki, "Toward intelligent machine-to-machine communications in smart grid," IEEE Communications Magazine, vol. 49, no. 4, pp. 60-65, 2011
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 60-65
-
-
Fadlullah, Z.M.1
Fouda, M.M.2
Kato, N.3
Takeuchi, A.4
Iwasaki, N.5
Nozaki, Y.6
-
9
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
D. He, J. Bu, S. Chan, C. Chen and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 431-436, 2011
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
10
-
-
84881388540
-
Strong roaming authentication technique for wireless and mobile networks
-
D. He, C. Chen, S. Chan and J. Bu, "Strong roaming authentication technique for wireless and mobile networks," International Journal of Communication Systems, vol. 26, no. 8, pp. 1028-1037, 2013
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.8
, pp. 1028-1037
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
11
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
12
-
-
84991775226
-
AATCT: Anonymously authenticated transmission on the cloud with traceability
-
M. H. Ibrahim, "AATCT: Anonymously authenticated transmission on the cloud with traceability," International Journal of Advanced Computer Science & Applications, vol. 6, no. 9, pp. 251-259, 2015
-
(2015)
International Journal of Advanced Computer Science & Applications
, vol.6
, Issue.9
, pp. 251-259
-
-
Ibrahim, M.H.1
-
13
-
-
77953042205
-
Resisting traitors in linkable democratic group signatures
-
M. H. Ibrahim, "Resisting traitors in linkable democratic group signatures," International Journal of Network Security, vol. 9, no. 1, pp. 51-60, 2009
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 51-60
-
-
Ibrahim, M.H.1
-
14
-
-
84991775214
-
'Noninteractive, anonymously authenticated, and traceable message transmission for VANETs,'
-
M. H. Ibrahim, "Noninteractive, anonymously authenticated, and traceable message transmission for VANETs," International Journal of Vehicular Technology, 2009
-
(2009)
International Journal of Vehicular Technology
-
-
Ibrahim, M.H.1
-
15
-
-
84991757910
-
'Secure anonymously authenticated and traceable enterprise DRM system,'
-
September
-
M. H. Ibrahim, "Secure anonymously authenticated and traceable enterprise DRM system," International Journal of Computer Applications, vol. 126, no. 3, September 2015
-
(2015)
International Journal of Computer Applications
, vol.126
, Issue.3
-
-
Ibrahim, M.H.1
-
16
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
17
-
-
84875286190
-
An enhanced remote user authentication scheme with smart card
-
M. Kumar, "An enhanced remote user authentication scheme with smart card," International Journal of Network Security, vol. 10, no. 3, pp. 175-184, 2010
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 175-184
-
-
Kumar, M.1
-
18
-
-
77958081838
-
A new secure remote user authentication scheme with smart cards
-
M. Kumar, "A new secure remote user authentication scheme with smart cards," International Journal of Network Security, vol. 11, no. 2, pp. 88-93, 2010
-
(2010)
International Journal of Network Security
, vol.11
, Issue.2
, pp. 88-93
-
-
Kumar, M.1
-
19
-
-
84875095444
-
Guessing attacks on strong-password authentication protocol
-
C. C. Lee, C. H. Liu and M. S. Hwang, "Guessing attacks on strong-password authentication protocol," International Journal of Network Security, vol. 15, no. 1, pp. 64-67, 2013
-
(2013)
International Journal of Network Security
, vol.15
, Issue.1
, pp. 64-67
-
-
Lee, C.C.1
Liu, C.H.2
Hwang, M.S.3
-
20
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, 2010
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
21
-
-
84937436587
-
Efficient authenticated key exchange protocols for wireless body area networks
-
J. Liu, Q. Li, R. Yan and R. Sun, "Efficient authenticated key exchange protocols for wireless body area networks," EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 1, pp. 1-11, 2015
-
(2015)
EURASIP Journal on Wireless Communications and Networking
, vol.2015
, Issue.1
, pp. 1-11
-
-
Liu, J.1
Li, Q.2
Yan, R.3
Sun, R.4
-
22
-
-
70349791260
-
A simple user authentication scheme for grid computing
-
R. Lu, Z. Cao, Z. Chai and X. Liang, "A simple user authentication scheme for grid computing.," International Journal of Network Security, vol. 7, no. 2, pp. 202-206, 2008
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 202-206
-
-
Lu, R.1
Cao, Z.2
Chai, Z.3
Liang, X.4
-
23
-
-
79953785474
-
Grs: The green, reliability, and security of emerging machine to machine communications
-
R. Lu, X. Li, X. Liang, X. S. Shen and X. Lin, "Grs: The green, reliability, and security of emerging machine to machine communications," IEEE Communications Magazine, vol. 49, no. 4, pp. 28-35, 2011
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Shen, X.S.4
Lin, X.5
-
24
-
-
84870696413
-
A survey of intrusion detection techniques in cloud
-
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel and M. Rajarajan, "A survey of intrusion detection techniques in cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 42-57
-
-
Modi, C.1
Patel, D.2
Borisaniya, B.3
Patel, H.4
Patel, A.5
Rajarajan, M.6
-
25
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, vol. 21, no. 12, pp. 993-999, 1978
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
26
-
-
84935453827
-
Improved rfid authentication protocol based on randomized mceliece cryptosystem
-
C. Noureddine, F. Cherif, P. L. Cayrel and B. Mohamed, "Improved rfid authentication protocol based on randomized mceliece cryptosystem," International Journal of Network Security, vol. 17, no. 4, pp. 413-422, 2015
-
(2015)
International Journal of Network Security
, vol.17
, Issue.4
, pp. 413-422
-
-
Noureddine, C.1
Cherif, F.2
Cayrel, P.L.3
Mohamed, B.4
-
27
-
-
84991794644
-
-
Federal Information Processing Standards Publication
-
National Institute of Standards and Technology (NIST), "Fips 180-4, secure hash standard," Federal Information Processing Standards Publication
-
'Fips 180-4, secure hash standard,'
-
-
-
28
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
29
-
-
77951758784
-
Authentication and key establishment in dynamic wireless sensor networks
-
Y. Qiu, J. Zhou, J. Baek and J. Lopez, "Authentication and key establishment in dynamic wireless sensor networks," Sensors, vol. 10, no. 4, pp. 3718-3731, 2010
-
(2010)
Sensors
, vol.10
, Issue.4
, pp. 3718-3731
-
-
Qiu, Y.1
Zhou, J.2
Baek, J.3
Lopez, J.4
-
32
-
-
84871395060
-
'Efficient noninteractive secure protocol enforcing privacy in vehicle-to-roadside communication networks,'
-
F. M. Salem, M. H. Ibrahim and I. I. Ibrahim, "Efficient noninteractive secure protocol enforcing privacy in vehicle-to-roadside communication networks," International Journal of Vehicular Technology, vol. 2012, 2012
-
(2012)
International Journal of Vehicular Technology
, vol.2012
-
-
Salem, F.M.1
Ibrahim, M.H.2
Ibrahim, I.I.3
-
34
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initiation protocol
-
J. L. Tsai, "Efficient nonce-based authentication scheme for session initiation protocol," International Journal of Network Security, vol. 9, no. 1, pp. 12-16, 2009
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 12-16
-
-
Tsai, J.L.1
-
35
-
-
84886436167
-
Real-time intrusion detection in power system operations
-
J. Valenzuela, J. Wang and N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Transactions on Power Systems, vol. 28, no. 2, pp. 1052-1062, 2013
-
(2013)
IEEE Transactions on Power Systems
, vol.28
, Issue.2
, pp. 1052-1062
-
-
Valenzuela, J.1
Wang, J.2
Bissinger, N.3
-
37
-
-
84903885385
-
A regular expression matching approach to distributed wireless network security system
-
J. Wang, Y. Yanshuo and K. Zhou, "A regular expression matching approach to distributed wireless network security system," International Journal of Network Security, vol. 16, no. 5, pp. 382-388, 2014
-
(2014)
International Journal of Network Security
, vol.16
, Issue.5
, pp. 382-388
-
-
Wang, J.1
Yanshuo, Y.2
Zhou, K.3
-
38
-
-
84875747087
-
'Survey cyber security in the smart grid: Survey and challenges,'
-
April
-
W. Wang and Z. Lu, "Survey cyber security in the smart grid: Survey and challenges," Computer Networks, vol. 57, pp. 1344-1371, April 2013
-
(2013)
Computer Networks
, vol.57
, pp. 1344-1371
-
-
Wang, W.1
Lu, Z.2
-
39
-
-
84906687195
-
On optimally reducing power loss in microgrids with power storage devices
-
C. Wei, Z. M. Fadlullah, N. Kato and I. Stojmenovic, "On optimally reducing power loss in microgrids with power storage devices," IEEE Journal on Selected Areas in Communications, vol. 32, no. 7, pp. 1361-1370, 2014
-
(2014)
IEEE Journal on Selected Areas in Communications
, vol.32
, Issue.7
, pp. 1361-1370
-
-
Wei, C.1
Fadlullah, Z.M.2
Kato, N.3
Stojmenovic, I.4
-
40
-
-
84991821286
-
Composable secure roaming authentication protocol for cloud-assisted body sensor networks
-
Q. Q. Xie, S. R. Jiang, L. M. Wang and C. C. Chang, "Composable secure roaming authentication protocol for cloud-assisted body sensor networks," International Journal of Network Security, vol. 18, no. 5, pp. 816-831, 2016
-
(2016)
International Journal of Network Security
, vol.18
, Issue.5
, pp. 816-831
-
-
Xie, Q.Q.1
Jiang, S.R.2
Wang, L.M.3
Chang, C.C.4
-
41
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
G. Yang, Q. Huang, D. S. Wong and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 168-174, 2010
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.S.3
Deng, X.4
-
42
-
-
84964270270
-
An efficient and secure anonymous authentication scheme for mobile satellite communication systems
-
E. J. Yoon, K. Y. Yoo, J. W. Hong, S. Y. Yoon, D. I. Park and M. J. Choi, "An efficient and secure anonymous authentication scheme for mobile satellite communication systems," EURASIP Journal on Wireless Communications and Networking, vol. 2011, no. 1, pp. 1-10, 2011
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, Issue.1
, pp. 1-10
-
-
Yoon, E.J.1
Yoo, K.Y.2
Hong, J.W.3
Yoon, S.Y.4
Park, D.I.5
Choi, M.J.6
|