相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A hierarchical key management and authentication method for wireless sensor networks
Pourya Alimoradi et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2022)
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices
Zengpeng Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
A hierarchical key management method for wireless sensor networks
Kokab Havashemi Rezaeipour et al.
MICROPROCESSORS AND MICROSYSTEMS (2022)
An Authentication-Based Secure Data Aggregation Method in Internet of Things
Maryam Ataei Nezhad et al.
JOURNAL OF GRID COMPUTING (2022)
A secure three-factor authentication scheme for IoT environments
AmirHossein Ghafouri Mirsaraei et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2022)
Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
Rosheen Qazi et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)
KMPH: Key Management Scheme Based on Pool-Hash for WSN
Abdelhamid Helali et al.
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS (2021)
Password-authenticated searchable encryption
Liqun Chen et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2021)
A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks
Sujun Li et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks
Osama A. Khashan et al.
AD HOC NETWORKS (2021)
Secure authenticated key exchange for WSNs in IoT applications
Mingping Qi et al.
JOURNAL OF SUPERCOMPUTING (2021)
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Efat Yousefpoor et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage
Yuan Zhang et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
Mohammad Sadegh Yousefpoor et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)
A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
Amit Kumar Gautam et al.
SN APPLIED SCIENCES (2021)
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks
Mohammad Sadegh Yousefpoor et al.
WIRELESS NETWORKS (2020)
Matrix-based key management scheme for IoT networks
Mohammed Nafi et al.
AD HOC NETWORKS (2020)
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things
Mohamed Ali Kandi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs
Youliang Tian et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles
Qi Jiang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
LVID: A Multimodal Biometrics Authentication System on Smartphones
Libing Wu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs
Samir Athmani et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
SKWN: Smart and dynamic key management scheme for wireless sensor networks
Samira Mesmoudi et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)
MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks
Y. Harold Robinson et al.
WIRELESS PERSONAL COMMUNICATIONS (2019)
Dynamic key management algorithms in wireless sensor networks: A survey
Mohammad Sadegh Yousefpoor et al.
COMPUTER COMMUNICATIONS (2019)
A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things
Kisung Park et al.
IEEE ACCESS (2019)
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
Amrita Ghosal et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A security-enhanced mutual authentication scheme with privacy protected in wireless sensor networks
Haitao Yu et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Efficient and energy-aware key management framework for dynamic sensor networks
Mawloud Omar et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
An attack model based highly secure key management scheme for wireless sensor networks
Priyanka Ahlawat et al.
6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (2018)
A collusion-resistant dynamic key management scheme for WSNs
Furui Zhan et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
A dynamic key management scheme for dynamic wireless sensor networks
Seyed Hossein Erfani et al.
SECURITY AND COMMUNICATION NETWORKS (2015)