[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
Cloud-assisted wireless body area networks (WBANs) significantly facilitate efficient patient
treatment of high quality, unfortunately in the meanwhile greatly challenge the patient's data …
treatment of high quality, unfortunately in the meanwhile greatly challenge the patient's data …
Secure ad hoc trust initialization and key management in wireless body area networks
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …
security issue is to establish initial trust relationships among the BAN devices before they …
A survey of group key agreement protocols with constant rounds
H Xiong, Y Wu, Z Lu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-
time session key and protect the thereafter group-oriented communication with this session …
time session key and protect the thereafter group-oriented communication with this session …
Privacy-preserving authentication and key agreement protocols for D2D group communications
Device-to-Device (D2D) communications play a key role in the next generation mobile
communication networks and wireless systems (5G) and the Internet of Things ecosystem …
communication networks and wireless systems (5G) and the Internet of Things ecosystem …
Group device pairing based secure sensor association and key management for body area networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote
health monitoring. An important security issue during bootstrap phase of the BAN is to …
health monitoring. An important security issue during bootstrap phase of the BAN is to …
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
Abstract The Session Initiation Protocol (SIP) is a signaling communications protocol, which
has been chosen for controlling multimedia communication in 3G mobile networks. The …
has been chosen for controlling multimedia communication in 3G mobile networks. The …
Key management scheme for secure channel establishment in fog computing
L Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
Fog computing is a promising extension of cloud computing, and enables computing directly
at the edge of the network. Due to the decentralized and distributed nature of fog nodes …
at the edge of the network. Due to the decentralized and distributed nature of fog nodes …
An Enhanced Access Control Scheme in Wireless Sensor Networks.
Recently, Huang proposed a new access control scheme based on elliptic curve
cryptosystem which prevents malicious nodes from joining the sensor network. This scheme …
cryptosystem which prevents malicious nodes from joining the sensor network. This scheme …