An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks
- 14 October 2014
- journal article
- Published by Wiley in Security and Communication Networks
- Vol. 8 (9), 1752-1771
- https://doi.org/10.1002/sec.1140
Abstract
No abstract availableThis publication has 34 references indexed in Scilit:
- Identity-based Authentication and Access Control in Wireless Sensor NetworksInternational Journal of Computer Applications, 2012
- An efficient random key distribution scheme for large‐scale distributed sensor networksSecurity and Communication Networks, 2011
- A Simple and Generic Construction of Authenticated Encryption with Associated DataACM Transactions on Information and System Security, 2010
- An improved key distribution mechanism for large-scale hierarchical wireless sensor networksAd Hoc Networks, 2007
- Some Observations on the Theory of Cryptographic Hash FunctionsDesigns, Codes and Cryptography, 2006
- Elliptic curve cryptography-based access control in sensor networksInternational Journal of Security and Networks, 2006
- OFMC: A symbolic model checker for security protocolsInternational Journal of Information Security, 2005
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976