Related references
Note: Only part of the references are listed.The New Modified Methodology to Solve ECDLP Based on Brute Force Attack
Kritsanapong Somsuk et al.
RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018 (2019)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
Xiong Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
Dheerendra Mishra et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
Security in Internet of Things: issues, challenges, taxonomy, and architecture
Vipindev Adat et al.
TELECOMMUNICATION SYSTEMS (2018)
An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
Sravani Challa et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
Rifaqat Ali et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol
J. T. Thirukrishna et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Fault detection and recovery scheme for routing and lifetime enhancement in WSN
M. Yuvaraja et al.
WIRELESS NETWORKS (2017)
Energy efficient secured routing protocol for MANETs
Tejpreet Singh et al.
WIRELESS NETWORKS (2017)
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
Mohammad Wazid et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
Evolving privacy: From sensors to the Internet of Things
Javier Lopez et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Predistribution Scheme With Unreliable Links
Jun Zhao
IEEE-ACM TRANSACTIONS ON NETWORKING (2017)
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Fan Wu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks
Qiang Gao et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
Rongxing Lu et al.
IEEE ACCESS (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes
Tianyi Song et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Big-Sensing-Data Curation for the Cloud Is Coming A promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks
Chi Yang et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2017)
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks
Wei-Liang Tai et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)
LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks
Payal Khurana Batra et al.
WIRELESS NETWORKS (2016)
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Zhihua Xia et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Implementation of Text Encryption using Elliptic Curve Cryptography
Laiphrakpam Dolendro Singh et al.
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)