-
1
-
-
33947421714
-
Network-based fuzzy decentralized sliding-mode control for car-like mobile robots
-
Feb
-
C. L. Hwang, L. J. Chang, and Y. S. Yu, "Network-based fuzzy decentralized sliding-mode control for car-like mobile robots," IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 574-585, Feb. 2007.
-
(2007)
IEEE Trans. Ind. Electron
, vol.54
, Issue.1
, pp. 574-585
-
-
Hwang, C.L.1
Chang, L.J.2
Yu, Y.S.3
-
2
-
-
37549072558
-
Networked predictive control of systems with random network delays in both forward and feedback channels
-
Jun
-
G. P. Liu, Y. Xia, J. Chen, D. Rees, and W. Hu, "Networked predictive control of systems with random network delays in both forward and feedback channels," IEEE Trans. Ind. Electron., vol. 54, no. 3, pp. 1282-1297, Jun. 2007.
-
(2007)
IEEE Trans. Ind. Electron
, vol.54
, Issue.3
, pp. 1282-1297
-
-
Liu, G.P.1
Xia, Y.2
Chen, J.3
Rees, D.4
Hu, W.5
-
3
-
-
65449167290
-
A remote-control engineering laboratory
-
Jun
-
C. Lazar and S. Carari, "A remote-control engineering laboratory," IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2368-2375, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron
, vol.55
, Issue.6
, pp. 2368-2375
-
-
Lazar, C.1
Carari, S.2
-
4
-
-
47049131413
-
Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks
-
Jul
-
D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, "Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks," IEEE Trans. Ind. Electron. vol. 55, no. 7, pp. 2759-2766, Jul. 2008.
-
(2008)
IEEE Trans. Ind. Electron
, vol.55
, Issue.7
, pp. 2759-2766
-
-
Dondi, D.1
Bertacchini, A.2
Brunelli, D.3
Larcher, L.4
Benini, L.5
-
5
-
-
51449105416
-
Extending vehicular CAN fieldbuses with delay-tolerant networks
-
Sep
-
F. Gil-Castiñeira, F. J. González-Castaño, and L. Franck, "Extending vehicular CAN fieldbuses with delay-tolerant networks," IEEE Trans. Ind. Electron., vol. 55, no. 9, pp. 3307-3314, Sep. 2008.
-
(2008)
IEEE Trans. Ind. Electron
, vol.55
, Issue.9
, pp. 3307-3314
-
-
Gil-Castiñeira, F.1
González-Castaño, F.J.2
Franck, L.3
-
6
-
-
60449087942
-
Electronics in automotive engineering: A top-down approach for implementing industrial fieldbus technologies in city buses and coaches
-
Feb
-
P. Mariño, F. Poza, M. A. Domínguez, and S. Otero, "Electronics in automotive engineering: A top-down approach for implementing industrial fieldbus technologies in city buses and coaches," IEEE Trans. Ind. Electron., vol. 56, no. 2, pp. 589-600, Feb. 2009.
-
(2009)
IEEE Trans. Ind. Electron
, vol.56
, Issue.2
, pp. 589-600
-
-
Mariño, P.1
Poza, F.2
Domínguez, M.A.3
Otero, S.4
-
8
-
-
84945119254
-
Entity authentication and key distribution
-
Proc. 13th Advances Cryptology-CRYPTO, D. R. Stinson, Ed
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. 13th Advances Cryptology-CRYPTO, D. R. Stinson, Ed, 1994, LNCS, vol. 773, pp. 232-249.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Feb
-
W. C. Ku and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 204-207, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
11
-
-
26944497206
-
Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards
-
Proc. 2nd Int. Conf. FSKD, L. Wang and Y. Jin, Eds
-
D. Z. Sun and Z. F. Cao, "Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards," in Proc. 2nd Int. Conf. FSKD, L. Wang and Y. Jin, Eds, 2005, LNAI, vol. 3614, pp. 596-599.
-
(2005)
LNAI
, vol.3614
, pp. 596-599
-
-
Sun, D.Z.1
Cao, Z.F.2
-
12
-
-
27144545000
-
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
-
Nov
-
D. Z. Sun, J. D. Zhong, and Y. Sun, "Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme," Appl. Math. Comput., vol. 170, no. 2, pp. 1185-1193, Nov. 2005.
-
(2005)
Appl. Math. Comput
, vol.170
, Issue.2
, pp. 1185-1193
-
-
Sun, D.Z.1
Zhong, J.D.2
Sun, Y.3
-
13
-
-
34247505487
-
Security enhancement of an IC-card-based remote login mechanism
-
Jun
-
T. F. Cheng, J. S. Lee, and C. C. Chang, "Security enhancement of an IC-card-based remote login mechanism," Comput. Netw., vol. 51, no. 9, pp. 2280-2287, Jun. 2007.
-
(2007)
Comput. Netw
, vol.51
, Issue.9
, pp. 2280-2287
-
-
Cheng, T.F.1
Lee, J.S.2
Chang, C.C.3
-
14
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
Jun
-
J. Y. Liu, A. M. Zhou, and M. X. Gao, "A new mutual authentication scheme based on nonce and smart cards," Comput. Commun., vol. 31, no. 10, pp. 2205-2209, Jun. 2008.
-
(2008)
Comput. Commun
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
15
-
-
58149395609
-
A new design of wearable token system for mobile device security
-
Nov
-
D. Z. Sun, J. P. Huai, J. Z. Sun, J. W. Zhang, and Z. Y. Feng, "A new design of wearable token system for mobile device security," IEEE Trans. Consum. Electron., vol. 54, no. 4, pp. 1784-1789, Nov. 2008.
-
(2008)
IEEE Trans. Consum. Electron
, vol.54
, Issue.4
, pp. 1784-1789
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Zhang, J.W.4
Feng, Z.Y.5
-
16
-
-
62549133356
-
Robust and efficient password-authenticated key agreement using smart cards
-
Jun
-
W. S. Juang, S. T. Chen, and H. T. Liaw, "Robust and efficient password-authenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron
, vol.55
, Issue.6
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
17
-
-
84958769993
-
Side channel crypt-analysis of product ciphers
-
Proc. 5th ESORICS, J. J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side channel crypt-analysis of product ciphers," in Proc. 5th ESORICS, J. J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds, 1998, LNCS, vol. 1485, pp. 97-110.
-
(1998)
LNCS
, vol.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
18
-
-
39549112119
-
An efficient modular exponentiation algorithm against simple power analysis attacks
-
Nov
-
D. Z. Sun, J. P. Huai, J. Z. Sun, and Z. F. Cao, "An efficient modular exponentiation algorithm against simple power analysis attacks," IEEE Trans. Consum. Electron., vol. 53, no. 4, pp. 1718-1723, Nov. 2007.
-
(2007)
IEEE Trans. Consum. Electron
, vol.53
, Issue.4
, pp. 1718-1723
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Cao, Z.F.4
-
19
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
Proc. 5th Annu. Int. Workshop SAC, S. Tavares and H. Meijer, Eds
-
S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols," in Proc. 5th Annu. Int. Workshop SAC, S. Tavares and H. Meijer, Eds, 1999, LNCS, vol. 1556, pp. 339-361.
-
(1999)
LNCS
, vol.1556
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
20
-
-
67649341303
-
-
ITU-T, Recommendation X.509-the Directory: Public-Key and Attribute Certificate Frameworks, ITU-T Study Group 17, Aug. 2005. (equivalent to ISO/IEC 9594-8).
-
ITU-T, Recommendation X.509-the Directory: Public-Key and Attribute Certificate Frameworks, ITU-T Study Group 17, Aug. 2005. (equivalent to ISO/IEC 9594-8).
-
-
-
-
22
-
-
71849087704
-
Public-key cryptography and password protocols
-
Aug
-
S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, pp. 230-268, Aug. 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
|