4.7 Article

Blockchain-Enabled Certificate-Based Authentication for Vehicle Accident Detection and Notification in Intelligent Transportation Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

Cloud Centric Authentication for Wearable Healthcare Monitoring System

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Secure hierarchical authentication protocol in VANET

Xuelian Li et al.

IET INFORMATION SECURITY (2020)

Article Engineering, Electrical & Electronic

Federated Learning: Challenges, Methods, and Future Directions

Tian Li et al.

IEEE SIGNAL PROCESSING MAGAZINE (2020)

Article Engineering, Electrical & Electronic

Blockchain Empowered Asynchronous Federated Learning for Secure Data Sharing in Internet of Vehicles

Yunlong Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Federated Learning With Blockchain for Autonomous Vehicles: Analysis and Design Challenges

Shiva Raj Pokhrel et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Automation & Control Systems

Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT

Yunlong Lu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Secure Authentication and Key Management With Blockchain in VANETs

Haowen Tan et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Proceedings Paper Computer Science, Information Systems

Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System

Alireza Jolfaei et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Engineering, Electrical & Electronic

Security and Privacy for the Internet of Drones: Challenges and Solutions

Chao Lin et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Engineering, Electrical & Electronic

Secure Message Communication Protocol Among Vehicles in Smart City

Amit Dua et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

Mohammad Wazid et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Civil

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm

Yanbing Liu et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)

Article Computer Science, Information Systems

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks

Mohammad Wazid et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Privacy-preserving data aggregation scheme against internal attackers in smart grids

Debiao He et al.

WIRELESS NETWORKS (2016)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

Mohammad Wazid et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

Provably secure user authentication and key agreement scheme for wireless sensor networks

Ashok Kumar Das et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis

Neeraj Kumar et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Proceedings Paper Computer Science, Hardware & Architecture

Authenticating IoT Devices With Physically Unclonable Functions Models

Mario Barbareschi et al.

2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC) (2015)

Article Computer Science, Hardware & Architecture

Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices

Cheng-Chi Lee et al.

IET COMPUTERS AND DIGITAL TECHNIQUES (2013)

Article Engineering, Electrical & Electronic

AUTOMATIC ACCIDENT DETECTION

Manuel Fogue et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2012)

Article Computer Science, Hardware & Architecture

Multiagent driven dynamic clustering of vehicles in VANETs

M. S. Kakkasageri et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Theory & Methods

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Yevgeniy Dodis et al.

SIAM JOURNAL ON COMPUTING (2008)

Article Computer Science, Theory & Methods

Practical byzantine fault tolerance and proactive recovery

M Castro et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)