References
- Ashton, K. That “Internet of Things” Thing: In the Real World Things Matter More than Ideas. – RFID Journal, 2009.
- Sorri, K., N. Mustafee, M. Seppänen. Revisiting IoT Definitions: A Framework towards Comprehensive Use. – Technological Forecasting and Social Change, Vol. 179, 06.2022, 121623.
- H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, Eds. Vision and Challenges for Realising the Internet of Things. European Commission, Information Society and Media, Brussels, 2010.
- Liu, R., J. Wang. Internet of Things: Application and Prospect. – MATEC Web of Conferences, 2017, 100. 02034. DOI: 10.1051/matecconf/201710002034.
- Rahoof, P., L. Nair, V. Ijyas. Trust Structure in Public Key Infrastructures. 2017, pp. 223-227. DOI: 10.1109/Anti-Cybercrime.2017.7905295.
- Vollala, S., N. Ramasubramanian, U. Tiwari. Public Key Cryptography. 2021. DOI: 10.1007/978-3-030-74524-0_2.
- Canteaut, A. Stream Cipher. 2011. DOI: 10.1007/0-387-23483-7_412.
- Singh, M., R., Khandakar. Digital Signatures. 2021. DOI: 10.1007/978-3-030-60890-3_14.
- Zhao, Z. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. – Journal of Medical Systems, Vol. 38, 2014, No 13. DOI: 10.1007/s10916-014-0013-5.
- Kahn, D. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner, 1996. ISBN 0684831309.
- Barnes, J. Amicable Numbers. 2016. DOI: 10.1007/978-3-319-46831-0_2.
- Pomerance, C. On Amicable Numbers. 2015. DOI: 10.1007/978-3-319-22240-0_19.
- Sadiku, M., C. Akujuobi. Fundamentals of Computer Networks. 2022. DOI: 10.1007/978-3-031-09417-0.
- Chahar, N. Computer Network Security. – International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, 2022. 1031. DOI: 10.5281/zenodo.6448170.
- Li, Y., S. Schäge, Z. Yang, F. Kohlar, J. Schwenk. On the Security of the Pre-Shared Key Ciphersuites of TLS. 2014. DOI: 10.1007/978-3-642-54631-0_38.
- Hwang, Min-Shiang, et al. An Access Control Based on a Scheme Chinese Theorem Remainder and Time Stamp Concept. 2003.
- Parkinson, S., S. Khana. Identifying High-Risk Over-Entitlement in Access Control Policies Using Fuzzy Logic. – Cybersecurity, Vol. 5, 2022, No 6. DOI: 10.1186/s42400-022-00112-1.
- Desmedt, Y., A. Shaghaghi. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. 2016, pp. 89-92.
- Penelova, M. Access Control Models. – Cybernetics and Information Technologies. Vol. 21, 2021, No 4, pp. 77-104.
- Denis, T., S. Johnson. Hash Functions. (2006). DOI: 10.1016/B978-159749104-4/50008-X.
- Bogdanov, A. A Gentle Introduction to Zero-Knowledge. 2022. DOI: 10.1007/978-3-031-04206-5_1.
- Rastogi, N., P. Avinav, R. Shweta. Enhanced Authentication Scheme Using Password Integrated Challenge Response Protocol. – International Journal of Computer Applications, Vol. 62, 2013, pp. 15-19. DOI: 10.5120/10107-4764.
- Al-Maliki, O., H. Al-Assam. Challenge-Response Mutual Authentication Protocol for EMV Contactless Cards. – Computers & Security, Vol. 103, 2021, 102186. DOI: 10.1016/j.cose.2021.102186.
