-
1
-
-
84868237790
-
Two-Tier user authentication scheme for heterogeneous sensor networks
-
Marina Del Rey, California, USA, June 8-10
-
X.H. Le, S. Lee, and Y.K. Lee. "Two-Tier User Authentication Scheme for Heterogeneous Sensor Networks." the 5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS '09), Marina Del Rey, California, USA, June 8-10, 2009.
-
(2009)
5th IEEE International Conference on Distributed Computing in Sensor Systems, (DCOSS '09)
-
-
Le, X.H.1
Lee, S.2
Lee, Y.K.3
-
2
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K.H.M. Wong, Y. Zheng, J. Cao, and S. Wang. "A dynamic user authentication scheme for wireless sensor networks." IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006.
-
(2006)
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
3
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
DOI 10.1109/GLOCOM.2007.190, 4411100, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, Proceedings
-
H.R. Tseng, R.H. Jan, and W. Yang. "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks." IEEE Global Communications Conference, (GLOBECOM 2007), USA, November 2007, pp. 986-990. (Pubitemid 351259178)
-
(2007)
GLOBECOM-IEEE Global Telecommunications Conference
, pp. 986-990
-
-
Tseng, H.-R.1
Jan, R.-H.2
Yang, W.3
-
5
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings-Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz. "Energy analysis of public-key cryptography for wireless sensor networks." in Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, 2005, pp. 324-328. (Pubitemid 43727945)
-
(2005)
Proceedings-Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
6
-
-
35448965082
-
Two tier secure routing protocol for heterogeneous sensor networks
-
DOI 10.1109/TWC.2007.06095
-
X. Du, G. Mohsen, X.O. Yang, C. Hsiao-Hwa. "Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks." IEEE Transactions on Wireless Communications, Vol.6 (9), September 2007, pp. 3395-3401. (Pubitemid 47625218)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3395-3401
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
-
7
-
-
0028272762
-
Privacy and authentication for wireless local area networks
-
A. Aziz and W. Diffie, "Privacy and authentication for wireless local area networks." IEEE Personal Communications Magazine, 1(1):25-31, 1994.
-
(1994)
IEEE Personal Communications Magazine
, vol.1
, Issue.1
, pp. 25-31
-
-
Aziz, A.1
Diffie, W.2
-
8
-
-
74549125519
-
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
-
X.H. Le, S. Lee, I. Butun, M. Khalid, and R. Sankar, "An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography." Journal of Communications and Networks, vol. 5, no. 3, 2009.
-
(2009)
Journal of Communications and Networks
, vol.5
, Issue.3
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
-
9
-
-
51849154205
-
Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
-
H.Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control." in 28th International Conference on Distributed Computing Systems, ICDCS'08, 2008, pp. 11-18.
-
(2008)
28th International Conference on Distributed Computing Systems, ICDCS'08
, pp. 11-18
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
|