-
1
-
-
70350023385
-
An Overview on Wireless Sensor Networks Technology and Evolution
-
Chiara, B.; Andrea, C.; Davide, D.; Roberto, V. An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 2009, 9, 6869-6896.
-
(2009)
Sensors
, vol.9
, pp. 6869-6896
-
-
Chiara, B.1
Andrea, C.2
Davide, D.3
Roberto, V.4
-
2
-
-
85056041682
-
-
Auerbach Publications, Taylor & Francis Group: Boca Raton, FL, USA
-
Callaway, E.H. Wireless Sensor Networks, Architectures and Protocols; Auerbach Publications, Taylor & Francis Group: Boca Raton, FL, USA, 2003.
-
(2003)
Wireless Sensor Networks, Architectures and Protocols
-
-
Callaway, E.H.1
-
3
-
-
2942686425
-
Sensor Networks: Evolution, Opportunities, and Challenges
-
Chong, C.Y.; Kumar, S. Sensor Networks: Evolution, Opportunities, and Challenges. Proc. IEEE 2003, 91, 1247-1256.
-
(2003)
Proc. IEEE
, vol.91
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
4
-
-
84919453382
-
User Authentication in Sensor Networks
-
Ulm, Germany
-
Benenson, Z.; Felix, C.G.; Dogan, K. User Authentication in Sensor Networks. In Proceedings of Workshop Sensor Networks, Ulm, Germany, 2004; pp. 385-389.
-
(2004)
Proceedings of Workshop Sensor Networks
, pp. 385-389
-
-
Benenson, Z.1
Felix, C.G.2
Dogan, K.3
-
5
-
-
14844304757
-
TinyPK: Securing Sensor Networks with Public Key Technology
-
Washington, DC, USA
-
Watro, R.; Derrick, K.; Sue-fen, C.; Charles, G.; Charles, L.; Peter, K. TinyPK: Securing Sensor Networks with Public Key Technology. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, Washington, DC, USA, 2004; pp. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Derrick, K.2
Sue-Fen, C.3
Charles, G.4
Charles, L.5
Peter, K.6
-
6
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan
-
Wong, K.H.M; Yuan, Z.; Jiannong, C.; Shengwei, W. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 2006; pp. 244-251.
-
(2006)
Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
7
-
-
39349093196
-
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
-
Washington, DC, USA
-
Tseng, H.R.; Jan, R.H.; Yang, W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of IEEE Globecom, Washington, DC, USA, 2007; pp. 986-990.
-
(2007)
Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
9
-
-
62449290253
-
A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks
-
Reykjavik, Iceland
-
Ko, L.C. A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of IEEE ISWCS, Reykjavik, Iceland, 2008; pp. 608-612.
-
(2008)
Proceedings of IEEE ISWCS
, pp. 608-612
-
-
Ko, L.C.1
-
10
-
-
74049156258
-
Robust Dynamic User Authentication Scheme for Wireless Sensor Networks
-
Canary Islands, Spain
-
Binod, V.; Jorge, S.S.; Joel, J.P.C.R. Robust Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of ACM Q2SWinet, Canary Islands, Spain, 2009; pp. 88-91.
-
(2009)
Proceedings of ACM Q2SWinet
, pp. 88-91
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.C.R.3
-
11
-
-
62949130774
-
Two-Factor User Authentication in Wireless Sensor Networks
-
Das, M.L. Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wireless Comm. 2009, 8, 1086-1090.
-
(2009)
IEEE Trans. Wireless Comm
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
12
-
-
84939573910
-
Differential Power Analysis
-
Santa Barbara, CA, USA
-
Kocher, P.; Jaffe, J.; Jun, B. Differential Power Analysis. In Proceedings of 19th International Advances in Cryptology Conference CRYPTO, Santa Barbara, CA, USA, 1999; pp. 388-397.
-
(1999)
Proceedings of 19th International Advances in Cryptology Conference CRYPTO
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
13
-
-
0036566408
-
Examining Smartcard Security under the Threat of Power Analysis Attacks
-
Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining Smartcard Security under the Threat of Power Analysis Attacks. IEEE Trans. Comp. 2002, 51, 541-552.
-
(2002)
IEEE Trans. Comp
, vol.51
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
14
-
-
33751167604
-
Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme'
-
Khan, M.K.; Zhang, J. Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme'. Comp. Stand. Interf. Elsevier Sci. 2007, 29, 82-85.
-
(2007)
Comp. Stand. Interf. Elsevier Sci
, vol.29
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
15
-
-
1942423677
-
Weaknesses and Improvements of An Efficient Password based Remote user Authentication Scheme using Smart Cards
-
Ku, W.C.; Chen, S.M. Weaknesses and Improvements of An Efficient Password based Remote user Authentication Scheme using Smart Cards. IEEE Trans. Cons. Elec. 2004, 50, 204-207.
-
(2004)
IEEE Trans. Cons. Elec
, vol.50
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
16
-
-
34248666700
-
Cryptanalysis and Improvement on two efficient remote user authentication scheme using smart cards
-
Wang, X.; Zhang W.; Zhang, J.; Khan M.K., Cryptanalysis and Improvement on Two Efficient Remote User Authentication Scheme using Smart Cards. Comp. Stand. Intefr. Elsevier Sci. 2007, 29, 507-512.
-
(2007)
Comp. Stand. Intefr. Elsevier Sci
, vol.29
, pp. 507-512
-
-
Wang, X.1
Zhang, W.2
Zhang, J.3
Khan, M.K.4
-
17
-
-
79955690469
-
Improvement of Das's two-factor authentication protocol in wireless sensor networks
-
ePrint Archive 2009/631. Online PDF: (accessed on 28 February 2010)
-
Nyang, DH.; Lee M.K. Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks, Cryptology ePrint Archive 2009/631. Online PDF: http://eprint.iacr.org/2009/631.pdf (accessed on 28 February 2010).
-
Cryptology
-
-
Nyang, D.H.1
Lee, M.K.2
|