Author:
Belattaf Samia,Mohammedi Mohamed,Omar Mawloud,Aoudjit Rachida
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference16 articles.
1. Shafagh, H. (2013). Leveraging public-key-based authentication for the Internet of Things. Thesis, RWTH Aachen University, Germany.
2. Nafi, M., Bouzefrane, S., & Omar, M. (2020). Matrix-based key management scheme for IoT network. Ad Hoc Networks, 97, 102003.
3. Rafaeli, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 35(3), 309–329.
4. Lavanya, S., & Usha, M. (2017). A survey on key management in Internet of Things. In The proceedings of the international conference on intelligent computing systems (pp. 572–580).
5. Sciancalepore, S., Capossele, A., Piro, G., Boggia, G., & Bianchi, G. (2015). Key management protocol with implicit certificates for IoT systems. In The proceedings of the 2015 workshop on IoT challenges in mobile and industrial systems, ACM IoT-Sys’15 (pp. 37–42).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献