-
1
-
-
84976520905
-
Performance evaluation of block ciphers for wireless sensor networks
-
(Eds: R. Choudhary, et al), Springer, Singapore
-
K. Biswas, V. Muthukkumarasamy, X.-W. Wu, and K. Singh, "Performance Evaluation of Block Ciphers for Wireless Sensor Networks," in: Advanced Computing and Communication Technologies, (Eds: R. Choudhary, et al), Springer, Singapore, 2016, pp. 443-452.
-
(2016)
Advanced Computing and Communication Technologies
, pp. 443-452
-
-
Biswas, K.1
Muthukkumarasamy, V.2
Wu, X.-W.3
Singh, K.4
-
2
-
-
85015170558
-
S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
-
D. Chen, N. Zhang, Z. Qin, X. Mao, Z. Qin, X. Shen, and X. Li, "S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol," IEEE Internet of Things Journal, 4, No. 1, pp. 88-100, 2017.
-
(2017)
IEEE Internet of Things Journal
, vol.4
, Issue.1
, pp. 88-100
-
-
Chen, D.1
Zhang, N.2
Qin, Z.3
Mao, X.4
Qin, Z.5
Shen, X.6
Li, X.7
-
3
-
-
85027511410
-
-
17 Jan
-
A. Humayed, J. Lin, F. Li, and B. Luo, "Cyber-Physical Systems Security - A Survey," arXiv: 1701.04525v1 [cs.CR], 17 Jan 2017.
-
(2017)
Cyber-Physical Systems Security - A Survey
-
-
Humayed, A.1
Lin, J.2
Li, F.3
Luo, B.4
-
5
-
-
85039783799
-
Lightweight mutual authentication for IoT and its applications
-
N. Li, D. Liu, and S. Nepal, "Lightweight Mutual Authentication for IoT and Its Applications," IEEE Transactions on Sustainable Computing, 14, No. 8, 2017.
-
(2017)
IEEE Transactions on Sustainable Computing
, vol.14
, Issue.8
-
-
Li, N.1
Liu, D.2
Nepal, S.3
-
6
-
-
85022194478
-
A security framework for the internet of things in the future internet architecture
-
X. Liu, M. Zhao, S. Li, F. Zhang, and W. Trappe, "A Security Framework for the Internet of Things in the Future Internet Architecture," Future Internet, 9, No. 27, 2017.
-
(2017)
Future Internet
, vol.9
, Issue.27
-
-
Liu, X.1
Zhao, M.2
Li, S.3
Zhang, F.4
Trappe, W.5
-
7
-
-
84973441945
-
A survey of key management schemes in multi-phase wireless sensor network
-
M. Messai and H. Seba, "A survey of key management schemes in multi-phase wireless sensor network," Computer Networks, 105, 2016, pp. 60-74.
-
(2016)
Computer Networks
, vol.105
, pp. 60-74
-
-
Messai, M.1
Seba, H.2
-
8
-
-
84893115938
-
Hardware security for device authentication in smart grid
-
(eds: J. Cuellar), Lecture Notes in Computer Science (LNCS) Springer, Berlin, Heidelberg
-
A. J. Paverd, and A.P. Martin, "Hardware Security for Device Authentication in Smart Grid," In Proceedings of 2012 International Workshop on Smart Grid Security, (eds: J. Cuellar), Lecture Notes in Computer Science (LNCS), Vol 7823. Springer, Berlin, Heidelberg, pp. 72-84, 2013.
-
(2013)
Proceedings of 2012 International Workshop on Smart Grid Security
, vol.7823
, pp. 72-84
-
-
Paverd, A.J.1
Martin, A.P.2
-
9
-
-
85045232507
-
Security challenges for the internet of things
-
T. Polk, and S. Turner, "Security Challenges for the Internet of Things," IETF Security, 2011.
-
(2011)
IETF Security
-
-
Polk, T.1
Turner, S.2
-
10
-
-
84855203308
-
Computational and energy costs of cryptographic algorithms on handheld devices
-
H. Rifà-Pous and J. Herrera-Joancomartí, "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices," Future Internet, 3, 2011, pp. 31-48.
-
(2011)
Future Internet
, vol.3
, pp. 31-48
-
-
Rifà-Pous, H.1
Herrera-Joancomartí, J.2
-
11
-
-
84922933943
-
Low-energy security: Limits and opportunities in the internet of things
-
W. Trappe, R. Howard, and R.S. Moore, "Low-Energy Security: Limits and Opportunities in the Internet of Things," IEEE Security & Privacy, 13, no. 1, 2015, pp. 14-21.
-
(2015)
IEEE Security & Privacy
, vol.13
, Issue.1
, pp. 14-21
-
-
Trappe, W.1
Howard, R.2
Moore, R.S.3
-
12
-
-
84961073768
-
Green internet of things for smart world
-
C. Zhu, V.C.M. Leung, L. Shu, and E. C.-H. Ngai, "Green Internet of Things for Smart World," IEEE Access, 3, 2015, pp. 2151-2162.
-
(2015)
IEEE Access
, vol.3
, pp. 2151-2162
-
-
Zhu, C.1
Leung, V.C.M.2
Shu, L.3
Ngai, E.C.-H.4
-
13
-
-
84984677345
-
Intelligent device-to-device communication in the internet of things
-
O. Bello, and S. Zeadally, "Intelligent Device-to-Device Communication in the Internet of Things," IEEE Systems Journal, 10, no. 3, pp. 1172-1182, 2016.
-
(2016)
IEEE Systems Journal
, vol.10
, Issue.3
, pp. 1172-1182
-
-
Bello, O.1
Zeadally, S.2
-
14
-
-
0003470642
-
Security architecture for the internet protocol
-
December
-
S. Kent and K. Seo, "Security Architecture for the Internet Protocol," RFC 4301, December 2005.
-
(2005)
RFC 4301
-
-
Kent, S.1
Seo, K.2
-
15
-
-
85034114228
-
Information-theoretically secure key generation and management
-
Aachen, Germany, June 25-30
-
E-H. Yang and X.-W. Wu, "Information-Theoretically Secure Key Generation and Management," Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT 2017), Aachen, Germany, June 25-30, 2017, pp. 1529-1533.
-
(2017)
Proceedings of the 2017 IEEE International Symposium on Information Theory (ISIT 2017)
, pp. 1529-1533
-
-
Yang, E.-H.1
Wu, X.-W.2
-
16
-
-
85172564787
-
Information-theoretically secure key management
-
submitted to
-
E.-H. Yang and X.-W. Wu, "Information-Theoretically Secure Key Management," submitted to Journal of Cryptology, 2017.
-
(2017)
Journal of Cryptology
-
-
Yang, E.-H.1
Wu, X.-W.2
-
17
-
-
33746646599
-
Internet key exchange (IKEv2) protocol
-
December
-
C. Kaufman, "Internet Key Exchange (IKEv2) Protocol," RFC 4306, December 2005.
-
(2005)
RFC 4306
-
-
Kaufman, C.1
-
19
-
-
33751508709
-
-
NIST Special Publication 800-57
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for Key Management - Part 1: General," NIST Special Publication 800-57, 2005.
-
(2005)
Recommendation for Key Management - Part 1: General
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
20
-
-
84869660574
-
-
NIST Special Publication 800-57
-
E. Barker, W. Burr, A. Jones, T. Polk, S. Rose, M. Smid, and Q. Dang, "Recommendation for Key Management Part 3: Application-Specific Key Management Guidance," NIST Special Publication 800-57, 2009.
-
(2009)
Recommendation for Key Management Part 3: Application-Specific Key Management Guidance
-
-
Barker, E.1
Burr, W.2
Jones, A.3
Polk, T.4
Rose, S.5
Smid, M.6
Dang, Q.7
|