메뉴 건너뛰기




Volumn 22, Issue 5, 2017, Pages 848-858

Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing

Author keywords

Cyber security; Elliptic curve cryptography; Fog computing; Internet of things; Publish subscribe systems

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; FOG; GEOMETRY; INTERNET OF THINGS; MESSAGE PASSING; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; PUBLISHING; SERVERS;

EID: 85018814944     PISSN: 1383469X     EISSN: 15728153     Source Type: Journal    
DOI: 10.1007/s11036-017-0851-8     Document Type: Article
Times cited : (50)

References (18)
  • 2
    • 84955249617 scopus 로고    scopus 로고
    • A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    • Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72(9):3588–3600
    • (2016) J Supercomput , vol.72 , Issue.9 , pp. 3588-3600
    • Shen, H.1    Kumar, N.2    He, D.3    Shen, J.4    Chilamkurti, N.5
  • 3
    • 84929521727 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    • Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H-Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 74(10):3477–3488
    • (2014) Multimed Tools Appl , vol.74 , Issue.10 , pp. 3477-3488
    • Zhang, Z.1    Qi, Q.2    Kumar, N.3    Chilamkurti, N.4    Jeong, H.-Y.5
  • 7
    • 84959857890 scopus 로고    scopus 로고
    • Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications
    • In, vol
    • Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. In Access, IEEE, vol 3:1503–1511
    • (2015) Access, IEEE , vol.3 , pp. 1503-1511
    • Porambage, P.1    Braeken, A.2    Schmitt, C.3    Gurtov, A.4    Ylianttila, M.5    Stiller, B.6
  • 10
    • 84863145281 scopus 로고    scopus 로고
    • EventGuard: a system architecture for securing publish-subscribe networks
    • Srivatsa M, Liu L, Iyengar A (2011) EventGuard: a system architecture for securing publish-subscribe networks. ACM Trans Comput Syst 29:4
    • (2011) ACM Trans Comput Syst , vol.29 , pp. 4
    • Srivatsa, M.1    Liu, L.2    Iyengar, A.3
  • 16
    • 84991768903 scopus 로고    scopus 로고
    • Octopus: an edge-fog mutual authentication scheme
    • Ibrahim M (2016) Octopus: an edge-fog mutual authentication scheme. International Journal of Network Security 18(6):1089-1101
    • (2016) International Journal of Network Security , vol.18 , Issue.6 , pp. 1089-1101
    • Ibrahim, M.1
  • 18
    • 84912130127 scopus 로고    scopus 로고
    • The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on
    • Stojmenovic I, Wen S (2014) The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on, Warsaw, 2014, pp. 1–8
    • (2014) Warsaw , vol.2014 , pp. 1-8
    • Stojmenovic, I.1    Wen, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.