-
1
-
-
84959275167
-
Optimization of public key cryptography (rsa and ecc) for 16-bits devices based on 6lowpan
-
J. Ayuso, L. Marin, A. J. Jara, and A. F. G. Skarmeta. Optimization of public key cryptography (rsa and ecc) for 16-bits devices based on 6lowpan. 1st International Workshop on the Security of the Internet of Things, Tokyo, Japan, 2010.
-
(2010)
1st International Workshop on the Security of the Internet of Things, Tokyo, Japan
-
-
Ayuso, J.1
Marin, L.2
Jara, A.J.3
Skarmeta, A.F.G.4
-
2
-
-
63749114135
-
A survey of identity-based cryptography
-
J. Baek, J. Newmarch, R. Safavi-Naini, and W. Susilo. A survey of identity-based cryptography. In Proc. of Australian Unix Users Group Annual Conference, pages 95-102, 2004.
-
(2004)
Proc. of Australian Unix Users Group Annual Conference
, pp. 95-102
-
-
Baek, J.1
Newmarch, J.2
Safavi-Naini, R.3
Susilo, W.4
-
5
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the weil pairing. SIAM J. on Computing, 32(3):586-515, 2003.
-
(2003)
SIAM J. on Computing
, vol.32
, Issue.3
, pp. 515-586
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
67650159910
-
A tapestry of identity-based encryption: Practical frameworks compared
-
X. Boyen. A tapestry of identity-based encryption: Practical frameworks compared. International Journal of Applied Cryptography, 1(1):3-21, 2008.
-
(2008)
International Journal of Applied Cryptography
, vol.1
, Issue.1
, pp. 3-21
-
-
Boyen, X.1
-
7
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. on Computing, 33(1):167-226, 2003.
-
(2003)
SIAM J. on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
9
-
-
84964806145
-
Security considerations for secure and trustworthy smart home system in the iot environment
-
IEEE
-
J.-H. Han, Y. Jeon, and J. Kim. Security considerations for secure and trustworthy smart home system in the iot environment. In Information and Communication Technology Convergence (ICTC), 2015 International Conference on, pages 1116-1118. IEEE, 2015.
-
(2015)
Information and Communication Technology Convergence (ICTC), 2015 International Conference on
, pp. 1116-1118
-
-
Han, J.-H.1
Jeon, Y.2
Kim, J.3
-
11
-
-
84921461758
-
Securing smart home: Technologies, security challenges, and security requirements
-
IEEE
-
C. Lee, L. Zappaterra, K. Choi, and H.-A. Choi. Securing smart home: Technologies, security challenges, and security requirements. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 67-72. IEEE, 2014.
-
(2014)
Communications and Network Security (CNS), 2014 IEEE Conference on
, pp. 67-72
-
-
Lee, C.1
Zappaterra, L.2
Choi, K.3
Choi, H.-A.4
-
12
-
-
84904164851
-
Secured communication between mobile devices and smart home appliances
-
IEEE
-
T. Mantoro, M. A. M. Adnan, and M. Ayu. Secured communication between mobile devices and smart home appliances. In Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on, pages 429-434. IEEE, 2013.
-
(2013)
Advanced Computer Science Applications and Technologies (ACSAT), 2013 International Conference on
, pp. 429-434
-
-
Mantoro, T.1
Adnan, M.A.M.2
Ayu, M.3
-
15
-
-
70449717772
-
Stateful identity-based encryption scheme: Faster encryption and decryption
-
ACM
-
L. T. Phong, H. Matsuoka, and W. Ogata. Stateful identity-based encryption scheme: faster encryption and decryption. In ASIACCS '08 Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 381-388. ACM, 2008.
-
(2008)
ASIACCS '08 Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security
, pp. 381-388
-
-
Phong, L.T.1
Matsuoka, H.2
Ogata, W.3
|