Author:
Chatterjee Uddalak,Ray Sangram
Reference41 articles.
1. Wazid, M., Das, A.K., Odelu, V., Kumar, N., Conti, M., Jo, M.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J. (2017)
2. Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy A.G., Yoon, E.J., Yoo, K.Y.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5
3. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
4. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) Advances in Cryptography CRYPTO85’, vol. 218 of Lecture Notes in Computer Science, pp. 417–426. Springer (1986)
5. Kahvazadeh, S., Souza, V.B. Masip-Bruin, X., Marin-Tordera, E., Garcia, J.: Securing Combined Fog-to-Cloud system Through SDN Approach