Otwarty dostęp

A design of the lightweight key management system for multi-level embedded devices


Zacytuj

Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283–294. HassanW. H. 2019 Current research on Internet of Things (IoT) security: A survey Computer networks 148 283 294 Search in Google Scholar

Koopman, P. (2004). Embedded system security. Computer, 37(7), 95–97. KoopmanP. 2004 Embedded system security Computer 37 7 95 97 Search in Google Scholar

Ke, Y., Zhang, M. Q., Liu, J., Su, T. T., & Yang, X. Y. (2019). Generative steganography with Kerckhoffs’ principle. Multimedia Tools and Applications, 78(10), 13805–13818. KeY. ZhangM. Q. LiuJ. SuT. T. YangX. Y. 2019 Generative steganography with Kerckhoffs’ principle Multimedia Tools and Applications 78 10 13805 13818 Search in Google Scholar

Cui X, Zhao B, Fan P, & Xiao Y. (2017). A Key Management Mechanism Under the TrustZone Architecture (in Chinese). Journal of Shandong University (Science Edition), 52(6), 92–98. CuiX ZhaoB FanP XiaoY 2017 A Key Management Mechanism Under the TrustZone Architecture (in Chinese) Journal of Shandong University (Science Edition) 52 6 92 98 Search in Google Scholar

Gao, Y., Su, Y., Yang, W., Chen, S., Nepal, S., & Ranasinghe, D. C. (2019, March). Building secure SRAM PUF key generators on resource constrained devices. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 912–917). IEEE. GaoY. SuY. YangW. ChenS. NepalS. RanasingheD. C. 2019 March Building secure SRAM PUF key generators on resource constrained devices In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 912 917 IEEE Search in Google Scholar

Barbareschi, M., Battista, E., Mazzeo, A., & Venkatesan, S. (2014, August). Advancing wsn physical security adopting tpm-based architectures. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) (pp. 394–399). IEEE. BarbareschiM. BattistaE. MazzeoA. VenkatesanS. 2014 August Advancing wsn physical security adopting tpm-based architectures In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) 394 399 IEEE Search in Google Scholar

Zhao B, Li H, Ma J, & Huang Y. (2018). Security Enhanced Key Generation Scheme Based on USB Key (in Chinese). Computer Engineering and Applications, 10. ZhaoB LiH MaJ HuangY 2018 Security Enhanced Key Generation Scheme Based on USB Key (in Chinese) Computer Engineering and Applications 10 Search in Google Scholar

Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2011). Smart card security; Technology and adoption. International Journal of Security, 5(2), 74–84. TaherdoostH. SahibuddinS. JalaliyoonN. 2011 Smart card security; Technology and adoption International Journal of Security 5 2 74 84 Search in Google Scholar

Won, Y. S., Lee, J., & Han, D. G. (2018). Side channel leakages against financial ic card of the republic of korea. Applied Sciences, 8(11), 2258. WonY. S. LeeJ. HanD. G. 2018 Side channel leakages against financial ic card of the republic of korea Applied Sciences 8 11 2258 Search in Google Scholar

Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22(1), 103–119. MiloslavskayaN. TolstoyA. 2019 Internet of Things: information security challenges and solutions Cluster Computing 22 1 103 119 Search in Google Scholar

Tan K, Li Z, Guan Y, Ye L, Tong W, & Zhang B. (2019). Lightweight Key Management Solution for Electric Vehicle Charging Pile (in Chinese). power construction, 40(9), 73–81. TanK LiZ GuanY YeL TongW ZhangB 2019 Lightweight Key Management Solution for Electric Vehicle Charging Pile (in Chinese) power construction 40 9 73 81 Search in Google Scholar

Yin, C., & Du, L. (2019, December). Design of Intelligent Comprehensive Security System for Existing Office Building. In IOP Conference Series: Earth and Environmental Science (Vol. 358, No. 4, p. 042001). IOP Publishing. YinC. DuL. 2019 December Design of Intelligent Comprehensive Security System for Existing Office Building In IOP Conference Series: Earth and Environmental Science 358 4 042001 IOP Publishing Search in Google Scholar

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2021). Handbook of applied cryptography. Instructor, 202101. MenezesA. J. van OorschotP. C. VanstoneS. A. 2021 Handbook of applied cryptography. Instructor, 202101 Search in Google Scholar

Guo, W. W., Liu, F., Tian, H., Yang, F., Zheng, S., Wang, Y.,... & Zheng, J. H. (2020, November). A Novel Intelligent Management System of Library Seat. In 2020 International Conference on Robots & Intelligent System (ICRIS) (pp. 232–235). IEEE. GuoW. W. LiuF. TianH. YangF. ZhengS. WangY. ZhengJ. H. 2020 November A Novel Intelligent Management System of Library Seat In 2020 International Conference on Robots & Intelligent System (ICRIS) 232 235 IEEE Search in Google Scholar

Alan, U. D., & Birant, D. (2018). Server-based intelligent public transportation system with NFC. IEEE Intelligent Transportation Systems Magazine, 10(1), 30–46. AlanU. D. BirantD. 2018 Server-based intelligent public transportation system with NFC IEEE Intelligent Transportation Systems Magazine 10 1 30 46 Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics