-
1
-
-
0036688074
-
A survey on saensor network
-
Akyildiz, I.F.; Su, W.; Sankarasubramamiam, Y.; Cayirci, E. A survey on saensor network. IEEE Comm. Mag. 2002, 40, 102-114.
-
(2002)
IEEE Comm. Mag.
, vol.40
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramamiam, Y.3
Cayirci, E.4
-
2
-
-
0034771605
-
SPINS: Security protocol for sensor networks
-
Rome, Italy, July
-
Perrig, A.; Szewczyk, R.; Web, V.; Culler, D.; Tygar, J.D. SPINS: Security protocol for sensor networks. In Proceeding of the 7th Annual International Conference on Mobile Computing and Networks (MOBBICOM 2001), Rome, Italy, July 2001.
-
(2001)
Proceeding of the 7th Annual International Conference on Mobile Computing and Networks (MOBBICOM 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Web, V.3
Culler, D.4
Tygar, J.D.5
-
3
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, November
-
Karloff, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceeding of the 2nd ACM Conference on Embedded Networked Sensor System (SenSys 2004), Baltimore, MD, USA, November 2004.
-
(2004)
Proceeding of the 2nd ACM Conference on Embedded Networked Sensor System (SenSys 2004)
-
-
Karloff, C.1
Sastry, N.2
Wagner, D.3
-
4
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington, DC, USA, 25 October
-
Watro, R.; Kong, D.; Cuti, S.F.; Gardiner, C.; Lynn, C.; Kruus, P. TinyPK: Securing sensor networks with public key technology. In Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN '04, Washington, DC, USA, 25 October 2004.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN '04
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
5
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
Cambridge, MA, USA, 25-27 April
-
Luk, M.; Mezzour, G.; Perrig, A.; Gligor, V. MiniSec: A secure sensor network communication architecture. In Proceeding of the 6th International Conference on Information Processing in Sensor Networks, IPSN'07, Cambridge, MA, USA, 25-27 April 2007.
-
(2007)
Proceeding of the 6th International Conference on Information Processing in Sensor Networks, IPSN'07
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
6
-
-
79955703585
-
TriSec: A secure data framework for wireless sensor networks using authenticated encryption
-
Kumar, P.; Cho, S.; Lee, D.S.; Lee, Y.D.; Lee, H.J. TriSec: A secure data framework for wireless sensor networks using authenticated encryption. Int. J. Marit. Inf. Commun. Sci. 2010, 8, 129-135.
-
(2010)
Int. J. Marit. Inf. Commun. Sci.
, vol.8
, pp. 129-135
-
-
Kumar, P.1
Cho, S.2
Lee, D.S.3
Lee, Y.D.4
Lee, H.J.5
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasure
-
Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasure. Ad Hoc Netw. 2003, 293-315.
-
(2003)
Ad Hoc Netw
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
77952532148
-
User Authentication in sensor network (extended abstract)
-
Ulm, Germany, September
-
Benenson, Z.; Gartner, F.; Kesdogan, D. User Authentication in sensor network (extended abstract). In Proceedings of the Informatik 2004, 34. Jahrestagung der Gesellschaft fur Informatik, Workshop on Sensor Networks, Ulm, Germany, September 2004.
-
(2004)
Proceedings of the Informatik 2004, 34. Jahrestagung Der Gesellschaft Fur Informatik, Workshop on Sensor Networks
-
-
Benenson, Z.1
Gartner, F.2
Kesdogan, D.3
-
9
-
-
34250787561
-
Realizing robust user authentication in sensor networks
-
Stockholm, Sweden, 20-21 June
-
Benenson, Z.; Gedicke, N.; Raivio, O. Realizing robust user authentication in sensor networks. In Proceedings of the Workshop on Real-World Wireless Sensor Network (REALWSN'05), Stockholm, Sweden, 20-21 June 2005.
-
(2005)
Proceedings of the Workshop on Real-World Wireless Sensor Network (REALWSN'05)
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
10
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan, 5-7 June
-
Wong, K.H.M.; Zheng, Y.; Cao, J.; Wang, S. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), Taichung, Taiwan, 5-7 June 2006.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06)
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
11
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Washington, DC, USA, 26-30 November
-
Tseng, H.R.; Jan, R.H.; Yang, W. An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM'07), Washington, DC, USA, 26-30 November 2007; pp. 986-990.
-
(2007)
Proceedings of the IEEE Global Communications Conference (GLOBECOM'07)
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
13
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
Reykjavik, Iceland, 21-24 October
-
Ko, L.C. A novel dynamic user authentication scheme for wireless sensor networks. In Proceeding of the IEEE International Symposium on Wireless Communication Systems 2008, ISWCS'08, Reykjavik, Iceland, 21-24 October 2008; pp. 608-612.
-
(2008)
Proceeding of the IEEE International Symposium on Wireless Communication Systems 2008, ISWCS'08
, pp. 608-612
-
-
Ko, L.C.1
-
14
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
Vaidya, B.; Rodrigues, J.J.P.C.; Park, J.H. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. Int. J. Commun. Syst. 2010, 23, 1201-1222.
-
(2010)
Int. J. Commun. Syst.
, vol.23
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.P.C.2
Park, J.H.3
-
15
-
-
79957703093
-
Symmetric key based authenticated querying in wireless sensor networks
-
New York, NY, USA, June
-
Banerjee, S.; Mukhopadhyay, D. Symmetric key based authenticated querying in wireless sensor networks. In Proceedings of the 1st ACM International Conference on Integrated Internet Ad hoc and Sensor Networks (InterSense), New York, NY, USA, June 2002; pp. 1278-1287.
-
(2002)
Proceedings of the 1st ACM International Conference on Integrated Internet Ad Hoc and Sensor Networks (InterSense)
, pp. 1278-1287
-
-
Banerjee, S.1
Mukhopadhyay, D.2
-
16
-
-
77956376884
-
A user authentication scheme with privacy protection for wireless sensor networks
-
Tokyo, Japan, 6-7 August
-
Yoon, S.J.; Lee, H.; Ji, S.B.; Kim, K. A user authentication scheme with privacy protection for wireless sensor networks. In Proceedings of the 2nd Joint Workshop on Information Security, Tokyo, Japan, 6-7 August 2007; pp. 233-244.
-
(2007)
Proceedings of the 2nd Joint Workshop on Information Security
, pp. 233-244
-
-
Yoon, S.J.1
Lee, H.2
Ji, S.B.3
Kim, K.4
-
17
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
doi:10.1016/j.mcm.2011.01.010
-
Li, C.T.; Lee, C.C. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Modelling 2011, doi:10.1016/j.mcm.2011.01.010.
-
(2011)
Math. Comput. Modelling
-
-
Li, C.T.1
Lee, C.C.2
-
18
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Comm. 2009, 8, 1086-1090.
-
(2009)
IEEE Trans. Wireless Comm.
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
20
-
-
77955495427
-
Cryptanalysis and security improvement of 'two-factor user authentication in wireless sensor networks'
-
Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvement of 'two-factor user authentication in wireless sensor networks'. Sensors 2010, 10, 2450-2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
21
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Int. J. Ad-Hoc Sensor Wirel. Netw. 2010, 0, 1-11.
-
(2010)
Int. J. Ad-Hoc Sensor Wirel. Netw.
, vol.0
, pp. 1-11
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
22
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He, D.J.; Mab, M.D.; Zhang, Y.; Chen, C.; Bu, J.J. A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 2011, 34, 367-374.
-
(2011)
Comput. Commun
, vol.34
, pp. 367-374
-
-
He, D.J.1
Mab, M.D.2
Zhang, Y.3
Chen, C.4
Bu, J.J.5
-
23
-
-
84876670486
-
-
RSA. Available Online, accessed on 12 August
-
RSA. Available Online: http://www.rsa.com/node.aspx?id=1156 (accessed on 12 August 2010).
-
(2010)
-
-
-
24
-
-
85063335766
-
Nonmonotonic cryptographic protocols
-
Franconia, NH, USA, June
-
Rubin, A.D.; Honeyman, P. Nonmonotonic cryptographic protocols. In Proceedings of the Computer Security Foundation Workshop VII, Franconia, NH, USA, June 1994; pp. 100-116.
-
(1994)
Proceedings of the Computer Security Foundation Workshop VII
, pp. 100-116
-
-
Rubin, A.D.1
Honeyman, P.2
-
25
-
-
84876690295
-
-
Available Online, accessed on 10 January
-
MICAz. Available Online: http://www.openautomation.net/uploadsproductos/micaz_datasheet.pdf (accessed on 10 January 2010).
-
(2010)
MICAz
-
-
-
26
-
-
79958054827
-
-
Available Online, accessed on 12 January
-
TelosB Datasheet. Available Online: http://www.willow.co.uk/TelosB_Datasheet.pdf/ (accessed on 12 January 2010).
-
(2010)
TelosB Datasheet
-
-
-
27
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao, I.E.; Lee, C.C.; Hwang, M.S. A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 2006, 72, 727-740.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 1978, 21, 120-126.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0009504774
-
-
National Institute of Standards and Technology, US Department of Commerce: Gaithersburg, MD, USA. Available Online, accessed on 9 August
-
National Institute of Standards and Technology, FIPS PUB 180-1, Secure Hash Standard. US Department of Commerce: Gaithersburg, MD, USA. Available Online: http://www.techheap.com/cryptography/hash/fip180-1.pdf/ (accessed on 9 August 2009).
-
(2009)
FIPS PUB 180-1, Secure Hash Standard
-
-
-
31
-
-
77956946974
-
Integrity Regions: Authentication through Presence in Wireless Networks
-
Capkun, S.; Cagalj, M.; Karame, G.; Tippenhauer, N.O. Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 2010, 9, 1608-1621.
-
(2010)
IEEE Trans. Mob. Comput
, vol.9
, pp. 1608-1621
-
-
Capkun, S.1
Cagalj, M.2
Karame, G.3
Tippenhauer, N.O.4
-
33
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
Bellare, M.; Kilian, J.; Rogaway, P. The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 2000, 61, 362-399.
-
(2000)
J. Comput. Syst. Sci.
, vol.61
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
34
-
-
78751650849
-
Robust one-time password authentication scheme using smart card for home network environment
-
Vaidya, B.; Park, J.H.; Yeo, S.S.; Rodrigues, J.J.P.C. Robust one-time password authentication scheme using smart card for home network environment. Comput. Commun. 2011, 34, 326-336.
-
(2011)
Comput. Commun
, vol.34
, pp. 326-336
-
-
Vaidya, B.1
Park, J.H.2
Yeo, S.S.3
Rodrigues, J.J.P.C.4
-
36
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA, 15-19 August
-
Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceeding of the Advances in Cryptology (CRYPTO'99), Santa Barbara, CA, USA, 15-19 August 1999; pp. 388-397.
-
(1999)
Proceeding of the Advances in Cryptology (CRYPTO'99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
37
-
-
0036566408
-
Examining Smart-card security under the threat of Power Analysis attacks
-
Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining Smart-card security under the threat of Power Analysis attacks. IEEE Trans. Comput. 2002, 51, 541-552.
-
(2002)
IEEE Trans. Comput.
, vol.51
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
38
-
-
52949137008
-
Two-factor mutual authentication based on smart card and passwords
-
Yang, G.; Wong, D.S.; Wang, H.; Deng, X. Two-factor mutual authentication based on smart card and passwords. J. Comput. Syst. Sci. 2008, 74, 1160-1172.
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
39
-
-
37149000571
-
Power analysis attacks and countermeasuers
-
Popp, T.; Oswald, E.; Mangard, S. Power analysis attacks and countermeasuers. IEEE Des. Test. Comput. 2007, 24, 535-543.
-
(2007)
IEEE Des. Test. Comput.
, vol.24
, pp. 535-543
-
-
Popp, T.1
Oswald, E.2
Mangard, S.3
-
40
-
-
0142007776
-
Cryptanalysis of a variant of peyravian-zunic's password authentication scheme
-
Ku, W.C.; Chen, C.M.; Lee, H.L. Cryptanalysis of a variant of peyravian-zunic's password authentication scheme. IEICE Trans. Commun. 2003, E86-B, 1682-1684.
-
(2003)
IEICE Trans. Commun.
, vol.E86-B
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
41
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
Ku, W.C.; Chen, S.M. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 2004, 50, 204-207.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
42
-
-
59649101587
-
Enhanced Authentication scheme with anonymity for roaming service in global mobility networks
-
Chang, C.C.; Lee, C.Y.; Chiu, Y.C. Enhanced Authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 2009, 32, 611-618.
-
(2009)
Comput. Commun.
, vol.32
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
|