-
1
-
-
85056041682
-
-
Auerbach Publications; Taylor & Francis Group: Boca Raton, FL, USA
-
E.H. Wireless Sensor Networks, Architectures and Protocols; Auerbach Publications; Taylor & Francis Group: Boca Raton, FL, USA, 2003.
-
(2003)
Wireless Sensor Networks, Architectures and Protocols
-
-
-
2
-
-
46449122114
-
Wireless Sensor Network Survey
-
Yick, J.; Mukherjee, B.; Ghosal, D. Wireless Sensor Network Survey. Comput. Network. 2008, 52, 2292-2330.
-
(2008)
Comput. Network
, vol.52
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
3
-
-
13944269967
-
Clock Synchronization for Wireless Sensor Network: A Survey
-
Sundararaman, B.; Buy, U.; Kshemkalyani, A.D. Clock Synchronization for Wireless Sensor Network: A Survey. Ad-Hoc Networks 2005, 3, 281-323.
-
(2005)
Ad-Hoc Networks
, vol.3
, pp. 281-323
-
-
Sundararaman, B.1
Buy, U.2
Kshemkalyani, A.D.3
-
4
-
-
4344643901
-
Environmental Sensor Networks
-
Martinez, K.; Hart, J.K.; Ong, R. Environmental Sensor Networks. Computer 2004, 37, 50-56.
-
(2004)
Computer
, vol.37
, pp. 50-56
-
-
Martinez, K.1
Hart, J.K.2
Ong, R.3
-
5
-
-
4243114087
-
Habitat Monitoring with Sensor Networks
-
Szewezyk, R.; Osterweil, E.; Polastre, J.; Hamilon, M.; Mainwaring, A.; Estrin, D. Habitat Monitoring with Sensor Networks. Commun. ACM 2004, 47, 34-40.
-
(2004)
Commun. ACM
, vol.47
, pp. 34-40
-
-
Szewezyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilon, M.4
Mainwaring, A.5
Estrin, D.6
-
6
-
-
4043122631
-
A Dynamic Id-Based Remote User Authentication Scheme
-
Das, M.L.; Saxena, A.; Gulati, V.P. A Dynamic Id-Based Remote User Authentication Scheme. IEEE Trans. Consum. Electron. 2004, 50, 629-631.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
7
-
-
1542542636
-
Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards
-
Leung, K.C.; Cheng, L.M.; Fong, A.S.; Chan, C.K. Cryptanalysis of a Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consum. Electron. 2003, 49, 1243-1245.
-
(2003)
IEEE Trans. Consum. Electron
, vol.49
, pp. 1243-1245
-
-
Leung, K.C.1
Cheng, L.M.2
Fong, A.S.3
Chan, C.K.4
-
8
-
-
0036688074
-
A Survey on Sensor Networks
-
Akyildiz, I.F.; Weilian, S.; Sankarasubramaniam, Y.; Cayirci, E. A Survey on Sensor Networks. IEEE Commun. Mag. 2002, 40, 102-114.
-
(2002)
IEEE Commun. Mag
, vol.40
, pp. 102-114
-
-
Akyildiz, I.F.1
Weilian, S.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
9
-
-
11244354854
-
Security considerations for IEEE 802.15.4 networks
-
Philadelphia, PA, USA, October
-
Sastry, N.; Wagner, D. Security Considerations for IEEE 802.15.4 Networks. In Proceedings of ACM Workshop on Wireless Security, Philadelphia, PA, USA, 1 October 2004; pp. 32-42.
-
(2004)
Proceedings of ACM Workshop on Wireless Security
, vol.1
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
10
-
-
14844304757
-
TinyPK: Securing Sensor Networks with Public Key Technology
-
Washington, DC, USA, 25 October
-
Watro, R.; Kong, D.; Cuti, S.-F.; Gardiner, C.; Lynn C.; Kruus, P. TinyPK: Securing Sensor Networks with Public Key Technology. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington, DC, USA, 25 October 2004; pp. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.-F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
11
-
-
33845458336
-
Dynamic User Authentication Scheme for Wireless Sensor Networks
-
Taichung, Taiwan, 5-7 June
-
Wong, K.H.M.; Zheng, Y.; Cao, J.; Wang, S. A Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 5-7 June 2006; pp. 244-251.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.A.4
-
12
-
-
62949130774
-
Two-Factor User Authentication in Wireless Sensor Networks
-
Das, M.L. Two-Factor User Authentication in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
-
(2009)
IEEE Trans. Wirel. Commun
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
13
-
-
39349093196
-
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
-
Washington, DC, USA, 26-30 November
-
Tseng, H.R.; Jan, R.H.; Yang, W. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of IEEE Globecom, Washington, DC, USA, 26-30 November 2007; pp. 986-990.
-
(2007)
Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
14
-
-
77954571452
-
Security Analysis of Two-Factor Authentication in Wireless Sensor Networks
-
Miyazaki, Japan, 23-25 June
-
Khan, M.K.; Alghathbar, K. Security Analysis of Two-Factor Authentication in Wireless Sensor Networks. In, Proceedings of Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences Miyazaki, Japan, 23-25 June 2010; pp. 55-60.
-
(2010)
Proceedings of Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences
, pp. 55-60
-
-
Khan, M.K.1
Alghathbar, K.2
-
15
-
-
77955495427
-
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
-
Khan, M.K.; Alghathbar, K. Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'. Sensors J. 2010, 10, 2450-2459.
-
(2010)
Sensors J
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
16
-
-
78049334450
-
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
-
Chen, T.H.; Shih, W.K. A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI J. 2010, 32, 704-712.
-
(2010)
ETRI J
, vol.32
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
17
-
-
11244298352
-
-
IEEE Standards for 802.15.4, Part 15, Amendment 4, IEEE: Washington, DC, USA
-
IEEE Standards for 802.15.4, Part 15, Amendment 4. Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks; IEEE: Washington, DC, USA, 2003.
-
(2003)
Wireless Medium Access Control and Physical Layer Specifications for Low-Rate Wireless Personal Area Networks
-
-
-
18
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N. Elliptic Curve Cryptosystems. Math. Comput. 1987, 48, 203-209.
-
(1987)
Math. Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
19
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
LNCS Cryptography Volume; Springer: Berlin/Heidelberg, Germany
-
Miller, V.S. Use of Elliptic Curves in Cryptography. In Advances in Cryptology-CRYPTO '85: Proceedings; LNCS Cryptography Volume; Springer: Berlin/Heidelberg, Germany, 1986; p. 417.
-
(1986)
Advances in Cryptology-CRYPTO '85: Proceedings
, pp. 417
-
-
Miller, V.S.1
-
20
-
-
84944878354
-
-
CRC Press Inc.: Boca Raton, FL, USA
-
Menezes, A.J.; Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press Inc.: Boca Raton, FL, USA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
|