메뉴 건너뛰기




Volumn 10, Issue 4, 2010, Pages 361-371

An enhanced two-factor user Authentication Scheme in Wireless Sensor Networks

Author keywords

Authentication; Hash function; Sensor networks

Indexed keywords


EID: 78650459565     PISSN: 15519899     EISSN: 15520633     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (265)

References (19)
  • 2
    • 77954607596 scopus 로고    scopus 로고
    • User authentication in sensor networks
    • Lecture Notes Informatics Proceedings Informatik
    • Benenson Z., Gartner F., and Kesdogan D. (2004). User authentication in sensor networks. Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik.
    • (2004) Proc. Workshop Sensor Networks
    • Benenson, Z.1    Gartner, F.2    Kesdogan, D.3
  • 4
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks. IEEE
    • Das M. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086-1090.
    • (2009) Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.1
  • 8
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • Shi J., Zhang R., and Zhang Y. (2009). Secure range queries in tiered sensor networks. in IEEE INFOCOM'2009.
    • (2009) IEEE INFOCOM'2009
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 11
    • 54449094667 scopus 로고    scopus 로고
    • Asecure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao Y., and Wang S. (2009).Asecure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, vol. 31, no. 1, pp. 24-29.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 24-29
    • Liao, Y.1    Wang, S.2
  • 12
    • 33845214903 scopus 로고    scopus 로고
    • Cryptanalysis of a flexible remote user authentication scheme using smart cards
    • Ku W., Chen S. (2005). Cryptanalysis of a flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, vol. 39, no. 1, pp. 90-96.
    • (2005) ACM Operating Systems Review , vol.39 , Issue.1 , pp. 90-96
    • Ku, W.1    Chen, S.2
  • 13
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku W., Chen S. (2004). Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.1    Chen, S.2
  • 14
    • 33744776672 scopus 로고    scopus 로고
    • A novel remote user authentication scheme using bilinear pairings
    • Das M., Saxena A., Gulati V., Phatak D. (2006).A novel remote user authentication scheme using bilinear pairings. Computers & Security, vol. 25, no. 3, pp. 184-189.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 184-189
    • Das, M.1    Saxena, A.2    Gulati, V.3    Phatak, D.4
  • 15
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • doi: 10.1016j.csi.2008.11.002
    • Hsiang H., and Shih W. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, doi: 10.1016j.csi.2008.11.002
    • (2009) Computer Standards & Interfaces
    • Hsiang, H.1    Shih, W.2
  • 16
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges T., Dabbish E., and Sloan R. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computer, vol. 51, no. 5, pp. 541-552.
    • (2002) IEEE Transactions on Computer , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 17
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication
    • National Institute of Standards and Technology, U.S. Department of Commerce. (2002). Secure Hash Standard. U.S. Federal Information Processing Standard Publication 180-182.
    • (2002) Secure Hash Standard , pp. 180-182
  • 18
    • 0041698518 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • Lee C., Hwang M., andYangW. (2002).A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.3 , pp. 46-52
    • Lee, C.1    Hwang, M.2
  • 19
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • doi:10.1016/j.comcom.2010.02.031
    • He D., Ma M., Zhang Y., Chen C., and Bu J. (2010). A strong user authentication scheme with smart cards for wireless communications. Computer Communications. doi:10.1016/j.comcom.2010.02.031.
    • (2010) Computer Communications
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.