Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC. Markmann, T., Schmidt, T. C., & Wählisch, M. Computer Communication Review, 45(5):603-604, 2015.
Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC. [link]Link  Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC. [link]Paper  bibtex   
@article{journals/ccr/MarkmannSW15,
  added-at = {2015-10-27T00:00:00.000+0100},
  author = {Markmann, Tobias and Schmidt, Thomas C. and Wählisch, Matthias},
  biburl = {http://www.bibsonomy.org/bibtex/259e683e73efa1deb505638ebfcfdf25c/dblp},
  ee = {http://doi.acm.org/10.1145/2829988.2790021},
  interhash = {015e9ea51546a760790a052bc0af1e80},
  intrahash = {59e683e73efa1deb505638ebfcfdf25c},
  journal = {Computer Communication Review},
  keywords = {dblp},
  number = 5,
  pages = {603-604},
  timestamp = {2015-10-29T11:36:31.000+0100},
  title = {Federated End-to-End Authentication for the Constrained Internet of Things Using IBC and ECC.},
  url = {http://dblp.uni-trier.de/db/journals/ccr/ccr45.html#MarkmannSW15},
  volume = 45,
  year = 2015
}

Downloads: 0