A lightweight authentication scheme for 5G mobile communications: a dynamic key approach
Author:
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science
Link
http://link.springer.com/content/pdf/10.1007/s12652-020-02857-4.pdf
Reference63 articles.
1. Abdmeziem MR, Tandjaoui D, Romdhani I (2015) A decentralized batch-based group key management protocol for mobile internet of things (DBGK). In: IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing, Liverpool, 2015, pp 1109–1117. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.166
2. Adavoudi-Jolfaei A, Ashouri-Talouki M, Aghili SF (2019) Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer Peer Netw Appl 12(1):43–59
3. Akshay S, Vishnukumar B, Mohan V, Anand MS (2018) Energy and Performance Analysis of Raspberry Pi with Modern Computing Devices. Int J Eng Technol 7(4.36):777–779
4. Alcaraz C, Lopez J, Roman R, Chen HH (2012) Selecting key management schemes for WSN applications. Comput Secur 31(8):956–966
5. Alghamdi TA, Lasebae A, Aiash M (2013) Security analysis of the constrained application protocol in the internet of things. In: Second international conference on future generation communication technologies (FGCT 2013). London, pp 163–168. https://doi.org/10.1109/FGCT.2013.6767217
Cited by 23 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT cybersecurity in 5G and beyond: a systematic literature review;International Journal of Information Security;2024-05-28
2. Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks;Computers and Electrical Engineering;2024-05
3. Deep-MAD: Deep learning based multiple attack detection for secure device- to-device communication in FOG environment1;Journal of Intelligent & Fuzzy Systems;2024-01-10
4. Design and Implementation of an Algorithm in 5G via D2D Communication;Lecture Notes in Networks and Systems;2024
5. Intelligent Frequency, Radiation Pattern and Polarization Reconfigurable Antenna for 5G Applications;Journal of Electrical Engineering & Technology;2023-12-14
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3