-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. F. Akyildiz et al., "A Survey on Sensor Networks, " IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-114.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
-
4
-
-
14844304757
-
C. Lynn, and P. Kruus, TinyPK: Securing sensor networks with public key technology
-
R. Watro et al., "C. Lynn, and P. Kruus, Tiny PK: Securing Sensor Networks with Public Key Technology, " Proc. ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 59-64.
-
(2004)
Proc. ACM Workshop Security Ad Hoc Sensor Netw.
, pp. 59-64
-
-
Watro, R.1
-
5
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K. Wong et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks, " Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Computing, 2006, pp. 244-251.
-
(2006)
Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Computing
, pp. 244-251
-
-
Wong, K.1
-
6
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M. L. Das, "Two-Factor User Authentication in Wireless Sensor Networks, " IEEE Trans. Wireless Commun., vol. 8, no. 3, 2009, pp. 1086-1090.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
7
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
H. R. Tseng, R. H. Jan, and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks, " IEEE Global Telecommun. Conf., 2007, pp. 986-990.
-
(2007)
IEEE Global Telecommun. Conf.
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
8
-
-
39049146014
-
Defense against outside attacks in wireless sensor networks
-
S. Tripathy and S. Nandi, "Defense Against Outside Attacks in Wireless Sensor Networks, " Computer Commun., vol. 31, no. 4, 2008, pp. 818-826.
-
(2008)
Computer Commun.
, vol.31
, Issue.4
, pp. 818-826
-
-
Tripathy, S.1
Nandi, S.2
-
9
-
-
77952326880
-
Improved robust user authentication scheme for wireless sensor networks
-
B. Vaidya, M. Chen, and J. Rodrigues, "Improved Robust User Authentication Scheme for Wireless Sensor Networks, " 5th IEEE Proc. Wireless Commun. Sensor Networks, 2009, pp. 1-6.
-
(2009)
5th IEEE Proc. Wireless Commun. Sensor Networks
, pp. 1-6
-
-
Vaidya, B.1
Chen, M.2
Rodrigues, J.3
-
10
-
-
38949096793
-
Security improvement on chien Et Al.'s remote user authentication scheme using smart cards
-
X. Duan, J. W. Liu, and Q. Zhang, "Security Improvement on Chien Et Al.'s Remote User Authentication Scheme Using Smart Cards, " IEEE Int. Conf. Computational Intell. Secur., 2006, pp. 1133-1135.
-
(2006)
IEEE Int. Conf. Computational Intell. Secur.
, pp. 1133-1135
-
-
Duan, X.1
Liu, J.W.2
Zhang, Q.3
-
11
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
Nov
-
C. H. Han and W. K. Shih, "Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment, " Comput. Stand. Interfaces, vol. 31, no. 6, Nov. 2009, pp. 1118-1123.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Han, C.H.1
Shih, W.K.2
-
12
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk, "Public-Key Cryptography and Password Protocols, " ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, 1999, pp. 230-268.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
13
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G. Yang et al., "Two-Factor Mutual Authentication Based on Smart Cards and Passwords, " J. Comput. Syst. Sci., vol. 74, no. 7, 2008, pp. 1160-1172.
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
-
14
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card, " Computers & Security, vol. 21, no. 4, 2002, pp. 372-375.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
15
-
-
0020720357
-
On the security of public-key protocols
-
D. Dolev and A. C. Yao, "On the Security of Public-Key Protocols, " IEEE Trans. Inform. Theory, vol. 29, no. 2, 1983, pp. 198-208.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
16
-
-
59649086399
-
Weaknesses and improvements of the yoon-ryu-yoo remote user authentication scheme using smart cards
-
Hsiang and W. K. Shih, "Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme Using Smart Cards, " Computer Commun., vol. 32, no. 4, 2009, pp. 649-652.
-
(2009)
Computer Commun.
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang1
Shih, W.K.2
-
17
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun., "Differential Power Analysis, " Proc. Advances Cryptology, LNCS, 1666, Springer-Verlag, 1999, pp. 388-397.
-
(1999)
Proc. Advances Cryptology, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
18
-
-
78049329614
-
Security enhancement on an improvement on two remote user authentication schemes using smart cards
-
Accepted, doi:10.1016/j.future.2010.08.007
-
T. H. Chen, H. C. Hsiang, and W. K. Shih, "Security Enhancement on an Improvement on Two Remote User Authentication Schemes Using Smart Cards, " Future Gen. Comput. Syst., Accepted, doi:10.1016/j.future.2010.08.007. 2010.
-
(2010)
Future Gen. Comput. Syst.
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
|