1 |
J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Gen. Comput. Syst, Vol. 29, No. 7, pp. 1645-1660, 2013.
DOI
|
2 |
K. H. Wang, C. M. Chen, W. Fang and T. Y. Wu, "A Secure Authentication Scheme for Internet of Things," Pervasive and Mobile Computing, Vol. 42, pp. 15-26, 2017.
DOI
|
3 |
R. J. McEliece, "A Public-Key Cryptosystem Based On Algebraic Coding Theory," Technical Report, NASA, 1978.
|
4 |
C. A. Melchor, N. Aragon, M. Bardet, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, A. Hauteville, A. Otmani, O. Ruatta, J. P. Tillich, and G. Zemor, "ROLLO-Rank-Ouroboros, LAKE& LOCKER," Submission to the NIST Post Quantum Standardization Process, Round 2, 2019.
|
5 |
K. S. Roy and H. K. Kalita, “A Code based Light-weight Authentication Scheme for IoT in Fog Computing Environment,” Jour of Adv Research in Dynamical & Control Systems, Vol. 11, No. 6, pp. 97-107, 2019.
|
6 |
Github: source code [internet], https://github.com/starj1023/Code-Based-Protocol-ROLLO-
|
7 |
A. Armando, D. Basin, Y. Boichut,Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P. C. Heam, O. Kouchnarenko, J. Mantovani, S. Modersheim, D. V. Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano, and L. Vigneron, "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications," in Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), Vol. 3576, pp. 281-285, 2005.
|