Author:
Diro Abebe Abeshu,Chilamkurti Naveen,Kumar Neeraj
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference18 articles.
1. Frahim J, Pignataro C, Apcar J, Morrow M (2016) Securing the internet of things: a proposed framework. http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html . Accessed July 2016
2. Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J Supercomput 72(9):3588–3600
3. Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H-Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 74(10):3477–3488
4. Hankerson D, Vanstone S, Menezes AJ (2003) Guide to elliptic curve cryptography. Springer-Verlag New York, Inc., Secaucus
5. Sandeep S (2006) Elliptic curve cryptography for constrained devices. PhD Dissertation
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献