Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. L. Atzori, A. Iera, and G. Morabito, ‘‘The Internet of Things: A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
    2. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, ‘‘Internet of Things (IoT): A vision, architectural elements, and future directions,’’ Future Generat. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, 2013.
    3. D. Dolev and A. Yao, ‘‘On the security of public key protocols,’’ IEEE Trans. Inf. Theory, vol. 29, no. 2, pp. 198–208, Mar. 1983. 
    4. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, ‘‘Examining smart-card security under the threat of power analysis attacks,’’ IEEE Trans. Comput., vol. 51, no. 5, pp. 541–552, May 2002.
    5.  P. Kocher, J. Jaffe, and B. Jun, ‘‘Differential power analysis,’’ in Advances in Cryptology, vol. 1666. Berlin, Germany: Springer-Verlag, 1999, pp. 388–397.
    6.  N. Koblitz, ‘‘Elliptic curves cryptosystems,’’ Math. Comput., vol. 48 , pp. 203–209, Sep. 1987.
    7. T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, ‘‘DTLS based security and two-way authentication for the Internet of Things,’’ Ad Hoc Netw., vol. 11, no. 8, pp. 2710–2723, Sep. 2013.
    8. D. Liu, P. Ning, S. Zhu, and S. Jajodia, ‘‘Practical broadcast authentication in sensor networks,’’ in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst. Netw. Serv. (MobiQuitous), San Diego, CA, USA, 2005, pp. 118–129

Recent Article