-
2
-
-
84955249617
-
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
-
Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72(9):3588–3600
-
(2016)
J Supercomput
, vol.72
, Issue.9
, pp. 3588-3600
-
-
Shen, H.1
Kumar, N.2
He, D.3
Shen, J.4
Chilamkurti, N.5
-
3
-
-
84929521727
-
A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
-
Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H-Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 74(10):3477–3488
-
(2014)
Multimed Tools Appl
, vol.74
, Issue.10
, pp. 3477-3488
-
-
Zhang, Z.1
Qi, Q.2
Kumar, N.3
Chilamkurti, N.4
Jeong, H.-Y.5
-
6
-
-
84946950129
-
-
Singh M, Rajan MA, Shivraj VL, Balamuralidhar P (2015) Secure MQTT for Internet of things (IoT). In communication systems and network technologies (CSNT), 2015 fifth International conference on, pp 746–751, 4-6 Apr 2015
-
(2015)
Secure MQTT for Internet of things (IoT). In communication systems and network technologies (CSNT), 2015 fifth International conference on, pp 746–751, 4-6 Apr 2015
-
-
Singh, M.1
Rajan, M.A.2
Shivraj, V.L.3
Balamuralidhar, P.4
-
7
-
-
84959857890
-
Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications
-
In, vol
-
Porambage P, Braeken A, Schmitt C, Gurtov A, Ylianttila M, Stiller B (2015) Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications. In Access, IEEE, vol 3:1503–1511
-
(2015)
Access, IEEE
, vol.3
, pp. 1503-1511
-
-
Porambage, P.1
Braeken, A.2
Schmitt, C.3
Gurtov, A.4
Ylianttila, M.5
Stiller, B.6
-
9
-
-
84929315070
-
-
Wang C, Carzaniga A, Evans D, Wolf AL (2002) Security issues and requirements for Internet-scale publish-subscribe systems. System Sciences, 2002. HICSS. Proceedings of the 35th annual Hawaii International conference on, 2002, pp. 3940–3947
-
(2002)
Security issues and requirements for Internet-scale publish-subscribe systems. System Sciences, 2002. HICSS. Proceedings of the 35th annual Hawaii International conference on, 2002, pp. 3940–3947
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
10
-
-
84863145281
-
EventGuard: a system architecture for securing publish-subscribe networks
-
Srivatsa M, Liu L, Iyengar A (2011) EventGuard: a system architecture for securing publish-subscribe networks. ACM Trans Comput Syst 29:4
-
(2011)
ACM Trans Comput Syst
, vol.29
, pp. 4
-
-
Srivatsa, M.1
Liu, L.2
Iyengar, A.3
-
13
-
-
78649304156
-
-
Technical Report. Sun Microsystems, Inc., Mountain View
-
Gupta V, Wurm M, Yu Z, Millard M, Fung S, Gura N, Eberle H, Shantz SC (2005) Sizzle: a standards-based end-to-end security architecture for the embedded Internet. Technical Report. Sun Microsystems, Inc., Mountain View
-
(2005)
Sizzle: a standards-based end-to-end security architecture for the embedded Internet
-
-
Gupta, V.1
Wurm, M.2
Yu, Z.3
Millard, M.4
Fung, S.5
Gura, N.6
Eberle, H.7
Shantz, S.C.8
-
14
-
-
85030715615
-
-
Fiege L, Zeidler A, Buchmann A, Kilian-Kehr R, Mühl G, Darmstadt T (2004) Security aspects in publish/subscribe systems. In third Intl. Workshop on distributed event-based systems (DEBS’04, 2004)
-
(2004)
Security aspects in publish/subscribe systems. In third Intl. Workshop on distributed event-based systems (DEBS’04, 2004
-
-
Fiege, L.1
Zeidler, A.2
Buchmann, A.3
Kilian-Kehr, R.4
Mühl, G.5
Darmstadt, T.6
-
16
-
-
84991768903
-
Octopus: an edge-fog mutual authentication scheme
-
Ibrahim M (2016) Octopus: an edge-fog mutual authentication scheme. International Journal of Network Security 18(6):1089-1101
-
(2016)
International Journal of Network Security
, vol.18
, Issue.6
, pp. 1089-1101
-
-
Ibrahim, M.1
-
17
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
In:, Berkeley
-
Mitchell JC, Shmatikov V, Stern U (1998) Finite-state analysis of SSL 3.0. In: Proceedings of the 7th conference on USENIX security symposium - volume 7 (SSYM'98), vol 7. USENIX Association, Berkeley, pp 16–16
-
(1998)
Proceedings of the 7th conference on USENIX security symposium - volume 7 (SSYM'98), vol 7. USENIX Association
, pp. 16
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
18
-
-
84912130127
-
The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on
-
Stojmenovic I, Wen S (2014) The Fog computing paradigm: Scenarios and security issues. Computer Science and Information Systems (FedCSIS), 2014 Federated conference on, Warsaw, 2014, pp. 1–8
-
(2014)
Warsaw
, vol.2014
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
|