共 50 条
- [1] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676
- [2] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
- [3] An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
- [4] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
- [6] An Application Management Scheme Among M2M Gateways [J]. 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 275 - 276
- [7] A Chaos-based Authentication and Key Management Scheme for M2M Communication [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
- [8] Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3209 - 3219
- [10] M2M Security: Challenges and Solutions [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1241 - 1254