相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An optimized machine learning technology scheme and its application in fault detection in wireless sensor networks
Fang Fan et al.
JOURNAL OF APPLIED STATISTICS (2023)
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things
Xin Huang et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
Chenyu Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community
Adamu Sani Yahaya et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)
Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs
Hu Xiong et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems
Muhammad Asghar Khan et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)
A resource friendly authentication scheme for space-air-ground-sea integrated Maritime Communication Network
Muhammad Asghar Khan et al.
OCEAN ENGINEERING (2022)
Machine learning for 5G security: Architecture, recent advances, and challenges
Amir Afaq et al.
AD HOC NETWORKS (2021)
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Chien-Ming Chen et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure
Chien-Ming Chen et al.
SECURITY AND COMMUNICATION NETWORKS (2021)
An anonymous device to device access control based on secure certificate for internet of medical things systems
Shehzad Ashraf Chaudhry et al.
SUSTAINABLE CITIES AND SOCIETY (2021)
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Tsu-Yang Wu et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)
Hybrid Internet of Things (IoT) data transmission security corresponding to device verification
Ming-Shen Jian et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)
New Enhanced Authentication Protocol for Internet of Things
Mourade Azrour et al.
BIG DATA MINING AND ANALYTICS (2021)
Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification
Shu-Chuan Chu et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2020)
5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy
Rongxing Lu et al.
PROCEEDINGS OF THE IEEE (2020)
SLUA-WSN: Secure and Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
SungJin Yu et al.
SENSORS (2020)
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
Akasha Shafiq et al.
JOURNAL OF SENSORS (2020)
A Lightweight Three-Factor Authentication Scheme for WHSN Architecture
Abdullah M. Almuhaideb et al.
SENSORS (2020)
Anonymous three-factor authenticated key agreement for wireless sensor networks
Yanrong Lu et al.
WIRELESS NETWORKS (2019)
Using Compact Evolutionary Tabu Search algorithm for matching sensor ontologies
Xingsi Xue et al.
SWARM AND EVOLUTIONARY COMPUTATION (2019)
An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system
Preeti Soni et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2019)
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
Jiaqing Mo et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
An improved and provably secure three-factor user authentication scheme for wireless sensor networks
Fan Wu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol
Chien-Ming Chen et al.
APPLIED SCIENCES-BASEL (2018)
DDoS attacks in WSNs: detection and countermeasures
Ademola P. Abidoye et al.
IET WIRELESS SENSOR SYSTEMS (2018)
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Chenyu Wang et al.
SENSORS (2017)
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Qi Jiang et al.
IEEE ACCESS (2017)
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I-Pin Chang et al.
SENSORS (2015)
Internet of Things (IoT): A vision, architectural elements, and future directions
Jayavardhana Gubbi et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)
Node capture attack detection and defence in wireless sensor networks
S. H. Jokhio et al.
IET WIRELESS SENSOR SYSTEMS (2012)