Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. El Mouaatamid O, Lahmer M, Belkasmi M. Internet of Things Security: layered classification of attacks and possible countermeasures. Electron J Inf Technol. 2016;9:24–37.
2. Borgia E. The Internet of Things vision: Key features, applications and open issues. Comput Commun. 2014;54:1–31.
3. Chengzhe L, et al. SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks. Comput Netw. 2013;57(17):3492–510.
4. Mahalle PN, Prasad NR, Prasad R. Threshold cryptography-based group authentication (TCGA) scheme for the internet of things (IoT). In: 2014 4th international conference on wireless communications, vehicular technology, information theory and aerospace & Electronic Systems (VITAE). IEEE; 2014.
5. Simplicio MA Jr, Marcos A, et al. Lightweight and escrow-less authenticated key agreement for the internet of things. Comput Commun. 2017;9:43–51.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献