1 |
W. Stallings and L. Brown, "Computer Security: principal and practice," 3rd Ed., pearson, 2014.
|
2 |
L. Reyzin, N. Reyzin "Better than BiBa: short one-time signatures with fast signing and verifying," Proceedings of the 7th Australian Conference on Information Security and Privacy, London, UK, pp. 144-153, 2002.
|
3 |
Josef Pieprzyk, Huaxiong Wang, and Chaoping Xing, "Multiple-time signature schemes against adaptive chosen message attacks," International Workshop on Selected Areas in Cryptography, Springer, pp. 88-100, 2003.
|
4 |
J. Lee, S. Kim, Y. Cho, Y. Chung, Y. Park, "HORSIC: an efficient onetime signature scheme for wireless sensor networks," Inform. Processing Letters, vol. 112, pp. 783-787, 2012.
DOI
|
5 |
L. Eschenuer, V. D. Gligor, "A key-management scheme for distributed sensor networks," Proceedings of the 9th ACM conference on computer and communications security, pp.41-47, Nov. 2002.
|
6 |
W. Du, J. Deng, Y. S. Han, P. K. Varshney, "A key predistribution scheme for sensor networks using deployment knowledge," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 62-77, 2006.
DOI
|
7 |
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. Sen. Netw., vol. 2, pp. 500-528, 2006.
DOI
|
8 |
J. Jang, T. Kwon, J. Song, "A time-based key management protocol for wireless sensor networks," Proceedings of ISPEC, LNCS 4464, pp. 314-328, 2007.
|
9 |
S. Nesteruk, S. Bezzateev, "Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure," Proceeding of the 22nd FRUCT Association, pp. 190-197, 2018.
|
10 |
P. Vijayakumar, M. Azees, A. Kannan and L. Jegatha Deborah, "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks," IEEE Transaction on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015-1028, April 2016.
DOI
|
11 |
Yavuz, A.A. "An efficient real-time broadcast authentication scheme for command and control messages," IEEE Transactions on Information Forensic and Security, vol. 9, no. 10, pp. 1733-174, 2014.
DOI
|
12 |
Jin Sook Bong, Yu Hwa Suh, Ui Jin Jang and Yongtae Shin, "RSU-independent Message Authentication Scheme using CRT-based Group Key in VANET," Journal of KIISE, Vol. 46, No. 3, pp. 277-284, 2019.
DOI
|
13 |
Bamasag, Omaimah Omar, and Kamal Youcef-Toumi, "Towards continuous authentica-tion in internet of things based on secret sharing scheme," Proceedings of the WESS'15: Workshop on Embedded Systems Security, pp. 1-8, 2015.
|
14 |
Xiao, J. andChen, C., "Authentication and Access Control in the Internet of Things," Proceedings of 32nd International Conference on Distributed Computing Systems Workshops, pp. 588-592, 2012.
|