共 114 条
[1]
Aazam M(2019)Fog computing for 5G tactile industrial internet of things: Qoe-aware resource allocation model IEEE Trans Ind Inform 15 3085-3092
[2]
Harras KA(2017)A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography IEEE Access 5 22313-22328
[3]
Zeadally S(2018)A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment Future Gener Comput Syst 78 1005-1019
[4]
Al Hamid HA(2009)Improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’) Netw Work Group Req Comments 5448 1-29
[5]
Rahman SMM(2020)Highly efficient symmetric key based authentication and key agreement protocol using keccak Sensors 20 2160-64052
[6]
Hossain MS(2018)Efficient and provably secure key agreement for modern smart metering communications Energies 11 2662-96
[7]
Almogren A(2019)Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks IEEE Access 7 64040-10106
[8]
Alamri A(2015)ASEC: Anonym signcryption scheme based on EC operations Int J Comput Appl 5 90-428
[9]
Amin R(2019)Symmetric-key-based security for multicast communication in wireless sensor networks Computers 8 27-3873
[10]
Kumar N(2018)An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks Appl Sci 8 1074-88