[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks

J Zhou, Z Cao, X Dong, N Xiong, AV Vasilakos - Information Sciences, 2015 - Elsevier
Cloud-assisted wireless body area networks (WBANs) significantly facilitate efficient patient
treatment of high quality, unfortunately in the meanwhile greatly challenge the patient's data …

Secure ad hoc trust initialization and key management in wireless body area networks

M Li, S Yu, JD Guttman, W Lou, K Ren - ACM Transactions on sensor …, 2013 - dl.acm.org
The body area network (BAN) is a key enabling technology in e-healthcare. An important
security issue is to establish initial trust relationships among the BAN devices before they …

A survey of group key agreement protocols with constant rounds

H Xiong, Y Wu, Z Lu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Group key agreement (shorten as GKA) protocol enables a group of users to negotiate a one-
time session key and protect the thereafter group-oriented communication with this session …

Privacy-preserving authentication and key agreement protocols for D2D group communications

M Wang, Z Yan - IEEE Transactions on Industrial Informatics, 2017 - ieeexplore.ieee.org
Device-to-Device (D2D) communications play a key role in the next generation mobile
communication networks and wireless systems (5G) and the Internet of Things ecosystem …

Group device pairing based secure sensor association and key management for body area networks

M Li, S Yu, W Lou, K Ren - 2010 Proceedings IEEE INFOCOM, 2010 - ieeexplore.ieee.org
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote
health monitoring. An important security issue during bootstrap phase of the BAN is to …

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card

D Mishra, AK Das, S Mukhopadhyay - Peer-to-peer networking and …, 2016 - Springer
Abstract The Session Initiation Protocol (SIP) is a signaling communications protocol, which
has been chosen for controlling multimedia communication in 3G mobile networks. The …

Key management scheme for secure channel establishment in fog computing

L Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
Fog computing is a promising extension of cloud computing, and enables computing directly
at the edge of the network. Due to the decentralized and distributed nature of fog nodes …

An Enhanced Access Control Scheme in Wireless Sensor Networks.

S Chatterjee, AK Das, JK Sing - Adhoc & Sensor Wireless …, 2014 - search.ebscohost.com
Recently, Huang proposed a new access control scheme based on elliptic curve
cryptosystem which prevents malicious nodes from joining the sensor network. This scheme …