-
1
-
-
0037086890
-
Wireless Sensor Networks: A Survey
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless Sensor Networks: a Survey", Int J Comput Telecommun Netw, vol. 38, no.4, pp.393-422, 2002.
-
(2002)
Int J Comput Telecommun Netw
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
4344643901
-
Environmental Sensor Networks
-
K. Martinez, J.K. Hart, R. Ong, "Environmental Sensor Networks", IEEE Comput. vol. 37, no.8, pp.50-56, 2004.
-
(2004)
IEEE Comput
, vol.37
, Issue.8
, pp. 50-56
-
-
Martinez, K.1
Hart, J.K.2
Ong, R.3
-
3
-
-
20344401315
-
Glacsweb: A Sensor Network for Hostile Environments
-
K. Martinez, R. Ong, J. Hart, "Glacsweb: a Sensor Network for Hostile Environments", In Proc. IEEE SECON 2004, pp. 81-87, 2004.
-
(2004)
In Proc. IEEE SECON
, vol.2004
, pp. 81-87
-
-
Martinez, K.1
Ong, R.2
Hart, J.3
-
4
-
-
4243114087
-
Habitat Monitoring with Sensor Networks
-
R. Szewezyk, E. Osterweil, J. Polastre, M. Hamilon, A. Mainwaring, D. Estrin, "Habitat Monitoring with Sensor Networks", Commun. ACM, vol.47, no.6, pp.34-40, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 34-40
-
-
Szewezyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilon, M.4
Mainwaring, A.5
Estrin, D.6
-
5
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar, "SPINS: Security Protocols for Sensor Networks", ACM Wireless Networks, vol.8, no.5, pp.521-534, 2002.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
6
-
-
34347217295
-
-
Auerbach Publications, CRC Press
-
J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, "Wireless Sensor Network Security: a Survey. Security in Distributed, Grid, and Pervasive Computing", Auerbach Publications, CRC Press, 2006.
-
(2006)
Wireless Sensor Network Security: A Survey. Security In Distributed, Grid, and Pervasive Computing
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
7
-
-
78549260205
-
Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks
-
Tahir Naeem, Kok-Keong Loo, "Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks", JDCTA, vol. 3, no. 1, pp. 88-93, 2009.
-
(2009)
JDCTA
, vol.3
, Issue.1
, pp. 88-93
-
-
Naeem, T.1
Loo, K.-K.2
-
8
-
-
78651575800
-
High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme
-
Hua-Yi Lin, "High Effect Secure Data Transmission Mechanisms in Wireless Sensor Networks Using ID-Based Key Management Scheme", JCIT, vol. 4, no. 1, pp. 77-83, 2009.
-
(2009)
JCIT
, vol.4
, Issue.1
, pp. 77-83
-
-
Lin, H.-Y.1
-
9
-
-
2942686425
-
Sensor Networks: Evolution, Opportunities, and Challenges
-
C.Y Chong, S. Kumar, "Sensor Networks: Evolution, Opportunities, and Challenges", In Proc. IEEE 2003, pp.1247-1256, 2003.
-
(2003)
In Proc. IEEE
, vol.2003
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
10
-
-
84919453382
-
User Authentication In Sensor Networks
-
In, Ulm, Germany
-
Z. Benenson, C.G. Felix, K. Dogan, "User Authentication in Sensor Networks", In Proceedings of Workshop Sensor Networks, Ulm, Germany, pp. 385-389, 2004.
-
(2004)
Proceedings of Workshop Sensor Networks
, pp. 385-389
-
-
Benenson, Z.1
Felix, C.G.2
Dogan, K.3
-
11
-
-
79958859464
-
A Secure Response Algorithm With Query Authentication For Wireless Sensor Networks
-
S. Tripathy, S. Nandi, A. Mitra, "A Secure Response Algorithm with Query Authentication for Wireless Sensor Networks", In Proc. Int. Asian Mobile Computing Conference (AMOC07), pp. 220-225, 2007.
-
(2007)
In Proc. Int. Asian Mobile Computing Conference (AMOC07)
, pp. 220-225
-
-
Tripathy, S.1
Nandi, S.2
Mitra, A.3
-
12
-
-
39049146014
-
Defense against Outside Attacks in Wireless Sensor Networks
-
S. Tripathy, S. Nandi, "Defense against Outside Attacks in Wireless Sensor Networks", Computer Communications, vol.31, pp.818-826, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 818-826
-
-
Tripathy, S.1
Nandi, S.2
-
13
-
-
39049094066
-
IMBAS: Identity-based Multi-user Broadcast Authentication in Wireless Sensor Networks
-
X.F. Cao, W.D. Kou, L.J. Dang, B. Zhao, "IMBAS: Identity-based Multi-user Broadcast Authentication in Wireless Sensor Networks", Computer Communications, vol.31, pp.659-667, 2008.
-
(2008)
Computer Communications
, vol.31
, pp. 659-667
-
-
Cao, X.F.1
Kou, W.D.2
Dang, L.J.3
Zhao, B.4
-
14
-
-
33845458336
-
A Dynamic User Authentication Scheme For Wireless Sensor Networks
-
Taichung, Taiwan
-
K.H.M. Wong, Z. Yuan, C. Jiannong, W. Shengwei, "A Dynamic User Authentication Scheme for Wireless Sensor Networks", In Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, pp. 244-251, 2006.
-
(2006)
In Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
15
-
-
39349093196
-
An Improved Dynamic User Authentication Scheme For Wireless Sensor Networks
-
Washington, DC, USA
-
H.R. Tseng, R.H. Jan, W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks", In Proceedings of IEEE Globecom, Washington, DC, USA, pp. 986-990, 2007.
-
(2007)
In Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
16
-
-
62949130774
-
Two-Factor User Authentication in Wireless Sensor Networks
-
M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks", IEEE Trans. Wireless Comm. 8, pp.1086-1090, 2009.
-
(2009)
IEEE Trans. Wireless Comm
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
17
-
-
62449290253
-
A Novel Dynamic User Authentication Scheme For Wireless Sensor Networks
-
Reykjavik, Iceland
-
L.C. Ko, "A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks", In Proceedings of IEEE ISWCS, Reykjavik, Iceland, pp. 608-612, 2008.
-
(2008)
In Proceedings of IEEE ISWCS
, pp. 608-612
-
-
Ko, L.C.1
-
18
-
-
74049156258
-
Robust Dynamic User Authentication Scheme For Wireless AASensor Networks
-
Canary Islands, Spain
-
V. Binod, S.S. Jorge, J.P.C.R. Joel, "Robust Dynamic User Authentication Scheme for Wireless AASensor Networks", In Proceedings of ACM Q2SWinet, Canary Islands, Spain, pp. 88-91, 2009.
-
(2009)
In Proceedings of ACM Q2SWinet
, pp. 88-91
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.C.R.3
-
19
-
-
0019634370
-
Password Authentication with Insecure Communication
-
L. Lamport, "Password Authentication with Insecure Communication", Communication of ACM, vol. 24, pp.28-30, 1981.
-
(1981)
Communication of ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
20
-
-
79952424939
-
Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments
-
Zuowen Tan, "Cryptanalysis of Two ID Based Password Authentication Schemes for Multi-server Environments", JDCTA, Vol. 5, No. 1, pp. 87-94, 2011.
-
(2011)
JDCTA
, vol.5
, Issue.1
, pp. 87-94
-
-
Tan, Z.1
-
21
-
-
77955495427
-
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
-
M.K. Khan, K. Alghathbar, "Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'", Sensors, vol.10, pp.2450-2459, 2010.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
22
-
-
0036566408
-
Examining Smart-card Security under the Threat of Power Analysis Attacks
-
T.S. Messerges, E.A. Dabbish, R.H. Sloan, "Examining Smart-card Security under the Threat of Power Analysis Attacks", IEEE Transactions on Computers, vol.51, no.5, pp. 541-552,2002.
-
(2002)
IEEE Transactions On Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
23
-
-
84939573910
-
-
In Advances in Cryptology-CRYPTO '99, Santa Barbara, California, USA, LN C S, Springer
-
P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis", In Advances in Cryptology-CRYPTO '99, Santa Barbara, California, USA, LN C S, vol. 1666, Springer, pp. 388-397,1999.
-
(1999)
Differential Power Analysis
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
|