-
1
-
-
2942686425
-
Sensor networks: Evolution, opportunities and challenges
-
Aug
-
C. Y. Chong and S. Kumar, "Sensor networks: evolution, opportunities and challenges," IEEE Proceedings, Vol. 91, No. 8, pp. 1247-1256, Aug. 2003.
-
(2003)
IEEE Proceedings
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
2
-
-
0026153410
-
Remote password authentication with smart cards
-
May
-
C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEEE Proceedings, Vol. 138, No. 3, pp. 165-168, May 1991.
-
(1991)
IEEE Proceedings
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
3
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M. L. Das, A. Saxena, and V. P. Gulati, "A dynamic ID-based remote user authentication scheme," IEEE Trans. on Consumer Electronics, Vol. 50, No. 2, 2004.
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.2
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
4
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
M. S. Huang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000
-
(2000)
IEEE Trans. on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Huang, M.S.1
Li, L.H.2
-
6
-
-
55849100194
-
Realizing robust user authentication in sensor networks
-
Sweden, June
-
Z. Benson, N. Gedicke, and O. Raivio, "Realizing robust user authentication in sensor networks," Workshop on Real-World Wireless Sensor Networks, Sweden, June 2005.
-
(2005)
Workshop on Real-World Wireless Sensor Networks
-
-
Benson, Z.1
Gedicke, N.2
Raivio, O.3
-
7
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM Press, pp
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lyn, and P. Kruus, "TinyPK: Securing sensor networks with public key technology," Proceedings of the ACM workshop on security of ad hoc and sensor networks, ACM Press, pp. 59-64, 2004.
-
(2004)
Proceedings of the ACM workshop on security of ad hoc and sensor networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lyn, C.5
Kruus, P.6
-
8
-
-
84919453382
-
User authentication in sensor networks (extended abstract)
-
Germany, September
-
Z. Benenson, F. Gartner, and D. Kesdogan, "User authentication in sensor networks (extended abstract)," Lecture notes in informatics proceedings of informatik, workshop on sensor networks, Germany, September 2004.
-
(2004)
Lecture notes in informatics proceedings of informatik, workshop on sensor networks
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
9
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K. H. M. Wong, Y. Zheng, J. Cao, and S. Wang, "A dynamic user authentication scheme for wireless sensor networks," Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, pp. 244-251, 2006.
-
(2006)
Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
11
-
-
55849087084
-
-
IEEE Standards for 802.15.4; Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks, 2003.
-
IEEE Standards for 802.15.4; Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks, 2003.
-
-
-
|