-
1
-
-
2942686425
-
Sensor Networks: Evolution, opportunities and challenges
-
August
-
C.Y. Chong and S. Kumar, "Sensor Networks: evolution, opportunities and challenges", Proceedings of IEEE, Vol. 91, No. 8, pp. 1247-1256, August 2003.
-
(2003)
Proceedings of IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
2
-
-
0026153410
-
Remote password authentication with smart cards
-
May
-
C.C. Chang, and T.C. Wu, "Remote Password Authentication with Smart Cards", IEEE Proceedings, vol. 138, no. 3, pp. 165-168, May 1991.
-
(1991)
IEEE Proceedings
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
4
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M.L. Das, A. Saxena, and V.P. Gulati, "A Dynamic ID-based Remote User Authentication Scheme", IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
5
-
-
33751197641
-
Comment on A dynamic ID-based remote user authentication scheme
-
September
-
A. Awasthi, "Comment on A dynamic ID-based Remote User Authentication Scheme", Transaction on Cryptology, Vol. 01, Issue 02, Page 15-17, September 2004
-
(2004)
Transaction on Cryptology
, vol.1
, Issue.2
, pp. 15-17
-
-
Awasthi, A.1
-
6
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M.S. Hwang and L.H. Li, "A New Remote User Authentication Scheme Using Smart Cards", IEEE Transaction Consumer Electronic, vol. 46, No. 1, pp. 28-30, 2000.
-
(2000)
IEEE Transaction Consumer Electronic
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
9
-
-
34250787561
-
Realizing robust user authentication in sensor networks
-
Sweden, June
-
Z. Benenson, N. Gedicke, and O. Raivio, "Realizing Robust User Authentication in Sensor Networks", Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005.
-
(2005)
Workshop on Real-world Wireless Sensor Networks
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
10
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
California, October
-
D. Malan, M. Welsh, and M. Smith, "A Public-key Infrastructure for Key Distribution in TinyOS based on Elliptic Curve Cryptography", First IEEE International Conference on Sensor and Ad Hoc Communications and Network, California, October 2004.
-
(2004)
First IEEE International Conference on Sensor and Ad Hoc Communications and Network
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
11
-
-
84919453382
-
User authentication in sensor networks
-
(Extended Abstract), Ulm, Germany, September
-
Z. Benenson, F. Gartner, and D. Kesdogan, "User Authentication in Sensor Networks (Extended Abstract)", Lecture Notes in Informatics Proceedings of Informatik 2004, Workshop on Sensor Networks, Ulm, Germany, September 2004.
-
(2004)
Lecture Notes in Informatics Proceedings of Informatik 2004, Workshop on Sensor Networks
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
12
-
-
11244354854
-
Security considerations for IEEE 802.15.4 networks
-
Philadelphia, PA, USA, October
-
N. Sastry and D. Wagner, "Security Considerations for IEEE 802.15.4 Networks", ACM Workshop on Wireless Security (WiSe 2004), Philadelphia, PA, USA, October 2004.
-
(2004)
ACM Workshop on Wireless Security (WiSe 2004)
-
-
Sastry, N.1
Wagner, D.2
-
14
-
-
48749093354
-
-
2005-10-03 (for Mica-z sensor mote), Chipcon AS
-
SmartRF CC2420 Datasheet (rev 1.3), 2005-10-03 (for Mica-z sensor mote), Chipcon AS, http://www.chipcon.com/files/CC2420_Data_Sheet_13.pdf
-
SmartRF CC2420 Datasheet (Rev 1.3)
-
-
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp.469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
18
-
-
0344197994
-
Some forgery attack on a remote authentication scheme using smart cards
-
C.C. Chang and K.F. Hwang, "Some Forgery Attack on a Remote Authentication Scheme Using Smart Cards", Informatics, vol. 14, no. 3, pp. 189-294, 2003.
-
(2003)
Informatics
, vol.14
, Issue.3
, pp. 189-294
-
-
Chang, C.C.1
Hwang, K.F.2
|