4.5 Article

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Artificial Intelligence

The New Modified Methodology to Solve ECDLP Based on Brute Force Attack

Kritsanapong Somsuk et al.

RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018 (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

Dheerendra Mishra et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Telecommunications

Security in Internet of Things: issues, challenges, taxonomy, and architecture

Vipindev Adat et al.

TELECOMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Theory & Methods

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

Rifaqat Ali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol

J. T. Thirukrishna et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Fault detection and recovery scheme for routing and lifetime enhancement in WSN

M. Yuvaraja et al.

WIRELESS NETWORKS (2017)

Article Computer Science, Information Systems

Energy efficient secured routing protocol for MANETs

Tejpreet Singh et al.

WIRELESS NETWORKS (2017)

Article Telecommunications

A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Theory & Methods

Evolving privacy: From sensors to the Internet of Things

Javier Lopez et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Hardware & Architecture

Topological Properties of Secure Wireless Sensor Networks Under the q-Composite Key Predistribution Scheme With Unreliable Links

Jun Zhao

IEEE-ACM TRANSACTIONS ON NETWORKING (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Telecommunications

A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks

Qiang Gao et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT

Rongxing Lu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes

Tianyi Song et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks

Wei-Liang Tai et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)

Article Computer Science, Information Systems

LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks

Payal Khurana Batra et al.

WIRELESS NETWORKS (2016)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Proceedings Paper Computer Science, Information Systems

Implementation of Text Encryption using Elliptic Curve Cryptography

Laiphrakpam Dolendro Singh et al.

ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)