共 58 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Hierarchical Polynomial-based Key Management Scheme in Fog Computing
[J].
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE),
2018,
:1593-1597
[4]
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 84
:200-215
[6]
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:1005-1019
[7]
A robust and anonymous patient monitoring system using wireless medical sensor networks
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 80
:483-495
[10]
Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471