-
1
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Watro R., Kong D., Cuti S., Gardiner C., Lynn C., and Kruus P. (2004). TinyPK: securing sensor networks with public key technology. Proc. ACM Workshop Security of Ad Hoc Sensor Networks, pp. 59-64.
-
(2004)
Proc. ACM Workshop Security of Ad Hoc Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
2
-
-
77954607596
-
User authentication in sensor networks
-
Lecture Notes Informatics Proceedings Informatik
-
Benenson Z., Gartner F., and Kesdogan D. (2004). User authentication in sensor networks. Proc. Workshop Sensor Networks, Lecture Notes Informatics Proceedings Informatik.
-
(2004)
Proc. Workshop Sensor Networks
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
3
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Wong K., Zheng Y., Cao J., and Wang S. (2006).A dynamic user authentication scheme for wireless sensor networks. Proc. IEEE International Conf. Sensor Networks, Ubiquitous,Trustworthy Computing, pp. 244-251.
-
(2006)
Proc. IEEE International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
4
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks. IEEE
-
Das M. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1086-1090.
-
(2009)
Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.1
-
5
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig A., Szewczyk R.,Wen V., Culler D., and Tygar J. (2002). SPINS: security protocols for sensor networks. Wireless Networks, vol. 8, no. 5, pp. 521-534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
9
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
Gnawali O., Jang K., Paek J., Vieira M., Govindan R., Greenstein B., Joki A., Estrin D., and Kohler E. (2006). The tenet architecture for tiered sensor networks. in ACMSenSys'06, pp. 153-166.
-
(2006)
In ACMSenSys'06
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
11
-
-
54449094667
-
Asecure dynamic ID based remote user authentication scheme for multi-server environment
-
Liao Y., and Wang S. (2009).Asecure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, vol. 31, no. 1, pp. 24-29.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.1
Wang, S.2
-
12
-
-
33845214903
-
Cryptanalysis of a flexible remote user authentication scheme using smart cards
-
Ku W., Chen S. (2005). Cryptanalysis of a flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, vol. 39, no. 1, pp. 90-96.
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 90-96
-
-
Ku, W.1
Chen, S.2
-
13
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku W., Chen S. (2004). Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.1
Chen, S.2
-
14
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
Das M., Saxena A., Gulati V., Phatak D. (2006).A novel remote user authentication scheme using bilinear pairings. Computers & Security, vol. 25, no. 3, pp. 184-189.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.1
Saxena, A.2
Gulati, V.3
Phatak, D.4
-
15
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
doi: 10.1016j.csi.2008.11.002
-
Hsiang H., and Shih W. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, doi: 10.1016j.csi.2008.11.002
-
(2009)
Computer Standards & Interfaces
-
-
Hsiang, H.1
Shih, W.2
-
16
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges T., Dabbish E., and Sloan R. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computer, vol. 51, no. 5, pp. 541-552.
-
(2002)
IEEE Transactions on Computer
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
17
-
-
0003629990
-
-
National Institute of Standards and Technology, U.S. Department of Commerce, U.S. Federal Information Processing Standard Publication
-
National Institute of Standards and Technology, U.S. Department of Commerce. (2002). Secure Hash Standard. U.S. Federal Information Processing Standard Publication 180-182.
-
(2002)
Secure Hash Standard
, pp. 180-182
-
-
-
18
-
-
0041698518
-
A flexible remote user authentication scheme using smart cards
-
Lee C., Hwang M., andYangW. (2002).A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52.
-
(2002)
ACM Operating Systems Review
, vol.36
, Issue.3
, pp. 46-52
-
-
Lee, C.1
Hwang, M.2
-
19
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
doi:10.1016/j.comcom.2010.02.031
-
He D., Ma M., Zhang Y., Chen C., and Bu J. (2010). A strong user authentication scheme with smart cards for wireless communications. Computer Communications. doi:10.1016/j.comcom.2010.02.031.
-
(2010)
Computer Communications
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
|