共 38 条
- [1] Comments on "Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices" IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4666 - 4670
- [6] Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 352 - 369
- [7] A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 147 - +
- [8] Secure and Low-Power Authentication for Resource-Constrained Devices PROCEEDINGS 2015 5TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT), 2015, : 30 - 36
- [9] A lightweight secure cyber foraging infrastructure for resource-constrained devices SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 186 - 195