Design and analysis on trusted network equipment access authentication protocol

Y Lai, Y Chen, Q Zou, Z Liu, Z Yang - Simulation Modelling Practice and …, 2015 - Elsevier
Cloud security is a system engineering problem. A common approach to address the
problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud …

NIMSA: Non-Interactive Multihoming Security Authentication Scheme for vehicular communications in Mobile Heterogeneous Networks

Z Wang, P Dong - arXiv preprint arXiv:2202.03808, 2022 - arxiv.org
In vehicular communications, in-vehicle devices' mobile and multihoming characteristics
bring new requirements for devicevsecurity authentication. On the one hand, the existing …

A proposal to contribute to ITS standardization activity: A valuable network mobility management approach

N Toledo, M Higuero, M Huarte, J Matias… - Computer Standards & …, 2014 - Elsevier
The introduction of communication services in the demanding ITS scenarios strongly relies
on the existence of technologies that enable mobility and security. ITS related …

A security authentication protocol for trusted domains in an autonomous decentralized system

R Zhou, Y Lai, Z Liu, Y Chen, X Yao… - International Journal of …, 2016 - journals.sagepub.com
Software Defined Network (SDN) architecture has been widely used in various application
domains. Aiming at the authentication and security issues of SDN architecture in …

Web-based tourism risk assessment system incorporating Web-GIS and HIP technologies

CH Tsai - International Journal of Computer Applications in …, 2017 - inderscienceonline.com
Taiwan faces frequent natural disasters, but it makes great efforts to develop tourism. Thus,
the evaluation of losses caused by severe disasters on the tourism industry by means of …

A new secure and efficient scheme for network mobility management

S Smaoui, MS Obaidat, F Zarai… - Security and …, 2015 - Wiley Online Library
In order to separate a host's identity from its location on the Internet, the Host Identity
Protocol (HIP) was developed by the Internet Engineering Task Force as a mobility …

Comment on “Design and formal security evaluation of NeMHIP”

T Wang, D Ji - Computers & Security, 2015 - Elsevier
Abstract In [Computers & Security 32 (2013) 1–18], the authors proposed a new network
mobility management protocol named NeMHIP which was based on the HIP. What's more …

A compatibility strategy for enabling secure and efficient ITS communications in today's Internet

N Toledo, M Higuero, J Astorga, J Unzilla… - Telecommunication …, 2016 - Springer
Emerging communication services in the intelligent transportation systems (ITS) scenario
have recently considered the provision of Internet services because this fact will aid in safety …

[引用][C] 一种强安全的WSN 用户认证及密钥协商方案

张惠根, 周治平 - 传感技术学报, 2015