Related references
Note: Only part of the references are listed.Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment
Lianyong Qi et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications
Shunmei Meng et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities
K. -K. R. Choo et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
Authentication in mobile cloud computing: A survey
Mojtaba Alizadeh et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
Shehzad Ashraf Chaudhry et al.
ELECTRONIC COMMERCE RESEARCH (2016)
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari et al.
COMPUTER NETWORKS (2015)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
Shehzad Ashraf Ch et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
Wen-Bin Hsieh et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2014)
On the features and challenges of security and privacy in distributed internet of things
Rodrigo Roman et al.
COMPUTER NETWORKS (2013)
Internet of things: Vision, applications and research challenges
Daniele Miorandi et al.
AD HOC NETWORKS (2012)
The Internet of Things: A survey
Luigi Atzori et al.
COMPUTER NETWORKS (2010)
A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model
Kim-Kwang Raymond Choo
COMPUTER JOURNAL (2007)