-
2
-
-
28244469017
-
Analysis and improvement of authenticated key exchange protocol for sensor networks
-
Tian X, Wong DS, Zhu RW. Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Communications Letters 2005;9(11). pp. 970-972.
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.S.2
Zhu, R.W.3
-
5
-
-
35248853846
-
An efficient scheme for user authentication in wireless sensor networks
-
DOI 10.1109/AINAW.2007.80, 4221098, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/ Symposia, AINAW'07
-
Jiang C, Li B, Xu H. An efficient scheme for user authentication in wireless sensor networks. In: Proceedings of 21st international conference on advanced information networking and applications workshops; 2007. pp. 438-442. (Pubitemid 47565422)
-
(2007)
Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
, vol.2
, pp. 438-442
-
-
Jiang, C.1
Li, B.2
Xu, H.3
-
6
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC
-
Jia Z, Zhang Y, Shao H, Lin Y, Wang J. A remote user authentication scheme using bilinear pairings and ECC. In: Proceedings of the sixth international conference on intelligent system design and applications; 2006. pp. 1091-1094.
-
(2006)
Proceedings of the Sixth International Conference on Intelligent System Design and Applications
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
7
-
-
48649086275
-
A secure and efficient scheme of remote user authentication based on bilinear pairings
-
Liao YP, Wang SS. A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 IEEE region 10 conference; 2007. pp. 1-4.
-
(2007)
Proceedings of 2007 IEEE Region 10 Conference
, pp. 1-4
-
-
Liao, Y.P.1
Wang, S.S.2
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 1978;21(2). pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information 1985;IT-31. pp. 469-472.
-
(1985)
IEEE Transactions on Information
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
10
-
-
85015402934
-
Use of elliptic curves in cryptography
-
LNCS, Springer-Verlag
-
Miller VS. Use of elliptic curves in cryptography. In: Advances in cryptology, proceedings of CRYPTO'85, vol. 218. LNCS, Springer-Verlag; 1986. pp. 417-426.
-
(1986)
Advances in Cryptology, Proceedings of CRYPTO'85
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
11
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 1987;48. pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Choie YJ, Jeong E, Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 2005;162. pp. 179-188.
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
15
-
-
39049094066
-
IMBAS: Identitybased multi-user broadcast authentication in wireless sensor networks
-
Cao X, Kou W, Dang L, Zhao B. IMBAS: identitybased multi-user broadcast authentication in wireless sensor networks. Computer Communications 2008;31. pp. 659-667.
-
(2008)
Computer Communications
, vol.31
, pp. 659-667
-
-
Cao, X.1
Kou, W.2
Dang, L.3
Zhao, B.4
-
16
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Springer-Verlag
-
Shamir A. Identity based cryptosystems and signature schemes. In: Proceedings of CRYPTO' 84. LNCS, Springer-Verlag; 1984. pp. 47-53.
-
(1984)
Proceedings of CRYPTO' 84. LNCS
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
Yang JH, CC Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 2009;28. pp. 138-143.
-
(2009)
Computers and Security
, vol.28
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
|