-
1
-
-
33751197641
-
Comment on a dynamic ID-based remote user authentication scheme
-
A. Awasthi 2004 Comment on a dynamic ID-based remote user authentication scheme Trans. Cryptol. 1 2 15 17
-
(2004)
Trans. Cryptol.
, vol.1
, Issue.2
, pp. 15-17
-
-
Awasthi, A.1
-
2
-
-
4043089982
-
An enhanced remote user authentication scheme using smart cards
-
10.1109/TCE.2004.1309430
-
A. Awasthi S. Lal 2004 An enhanced remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 50 2 583 586 10.1109/TCE.2004.1309430
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 583-586
-
-
Awasthi, A.1
Lal, S.2
-
4
-
-
0026153410
-
Remote password authentication with smart cards
-
10.1049/ip-e.1991.0022
-
C.C. Chang T.C. Wu 1991 Remote password authentication with smart cards IEE Proc. E Comput. Digit. Tech. 138 3 165 168 10.1049/ip-e.1991.0022
-
(1991)
IEe Proc. e Comput. Digit. Tech.
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
10.1109/TWC.2008.080128
-
M.L. Das 2009 Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 1086 1090 10.1109/TWC.2008.080128
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
6
-
-
4043122631
-
A dynamic IDbased remote user authentication scheme
-
10.1109/TCE.2004.1309441
-
M.L. Das A. Saxena V.P. Gulati 2004 A dynamic IDbased remote user authentication scheme IEEE Trans. Consum. Electron. 50 2 629 631 10.1109/TCE.2004.1309441
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
8
-
-
51249105495
-
Rethinking Data Management for Storage-Centric Sensor Networks
-
Diao, Y.; Ganesan, D.; Mathur, G.; Shenoy, P.J.; 2007. Rethinking Data Management for Storage-Centric Sensor Networks. Proc. Conf. on Innovative Data Systems Research, p.22-31.
-
(2007)
Proc. Conf. on Innovative Data Systems Research
, pp. 22-31
-
-
Diao, Y.1
Ganesan, D.2
Mathur, G.3
Shenoy P., .J.4
-
9
-
-
0020720357
-
On the security of public key protocols
-
0502.94005 10.1109/TIT.1983.1056650
-
D. Dolev A. Yao 1983 On the security of public key protocols IEEE Trans. Inform. Theory 29 2 198 208 0502.94005 10.1109/TIT.1983.1056650
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
Du, W.; Deng, J.; Han, Y.; Varshney, P.; 2003. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Conf. on Computer and Communications Security, p.42-51. (Pubitemid 40673787)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Han, Y.S.2
Deng, J.3
Varshney, P.K.4
-
12
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
DOI 10.1016/j.cose.2005.03.006, PII S0167404805000477
-
C.I. Fan Y.C. Chan Z.K. Zhang 2005 Robust remote authentication scheme with smart cards Comput. & Secur. 24 8 619 628 10.1016/j.cose.2005.03.006 (Pubitemid 41690975)
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.-I.1
Chan, Y.-C.2
Zhang, Z.-K.3
-
13
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
DOI 10.1145/1182807.1182823, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
-
Gnawali, O.; Jang, K.Y.; Paek, J.; Vieira, M.; Govindan, R.; Greenstein, B.; Joki, A.; Estrin, D.; Kohler, E.; 2006. The Tenet Architecture for Tiered Sensor Networks. Proc. 4th Int. Conf. on Embedded Networked Sensor Systems, p.153-166. [doi:10.1145/1182807.1182823] (Pubitemid 47168684)
-
(2006)
SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
14
-
-
67649354423
-
Design and verification of enhanced secure localization scheme in wireless sensor networks
-
10.1109/TPDS.2008.166
-
D.J. He L. Cui H. Huang M. Ma 2009 Design and verification of enhanced secure localization scheme in wireless sensor networks IEEE Trans. Parall. Distr. Syst. 20 7 1050 1058 10.1109/TPDS.2008.166
-
(2009)
IEEE Trans. Parall. Distr. Syst.
, vol.20
, Issue.7
, pp. 1050-1058
-
-
He, D.J.1
Cui, L.2
Huang, H.3
Ma, M.4
-
16
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
10.1016/j.comcom.2010.02.031
-
D.J. He M. Ma Y. Zhang C. Chen J.J. Bu 2011 A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 367 374 10.1016/j.comcom.2010.02.031
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.J.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.J.5
-
17
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
10.1016/j.csi.2008.11.002
-
H.C. Hsiang W.K. Shih 2009 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 6 1118 1123 10.1016/j.csi.2008.11.002
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
18
-
-
0034140374
-
New remote user authentication scheme using smart cards
-
DOI 10.1109/30.826377
-
M.S. Hwang L.H. Li 2000 A new remote user authentication scheme using smart cards IEEE Trans. Consum. Electron. 46 1 28 30 10.1109/30.826377 (Pubitemid 30582655)
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang Min-Shiang1
Li Li-Hua2
-
19
-
-
36749002169
-
Mutual authentication and key exchange protocols for roaming services in wireless mobile networks
-
10.1109/TWC.2006.05063
-
Y. Jiang C. Lin X. Shen M. Shi 2006 Mutual authentication and key exchange protocols for roaming services in wireless mobile networks IEEE Trans. Wirel. Commun. 5 9 2569 2577 10.1109/TWC.2006.05063
-
(2006)
IEEE Trans. Wirel. Commun.
, vol.5
, Issue.9
, pp. 2569-2577
-
-
Jiang, Y.1
Lin, C.2
Shen, X.3
Shi, M.4
-
20
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
Lazos, L.; Poovendran, R.; 2004. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Proc. 3rd ACM Workshop on Wireless Security, p.21-30. [doi:10.1145/1023646.1023650] (Pubitemid 40062792)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
21
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
DOI 10.1109/TIE.2006.881998
-
C.C. Lee M.S. Hwang I.E. Liao 2006 Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 5 1683 1687 10.1109/TIE.2006.881998 (Pubitemid 44593519)
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
23
-
-
67649184080
-
Security flaw of authentication scheme with anonymity for wireless communications
-
10.1109/LCOMM.2009.090074
-
J.S. Lee J.H. Chang D.H. Lee 2009 Security flaw of authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 13 5 292 293 10.1109/LCOMM.2009.090074
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.5
, pp. 292-293
-
-
Lee, J.S.1
Chang, J.H.2
Lee, D.H.3
-
24
-
-
54449094667
-
A secure dynamic ID based remote user authentication scheme for multi-server environment
-
10.1016/j.csi.2007.10.007
-
Y.P. Liao S.S. Wang 2009 A secure dynamic ID based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 1 24 29 10.1016/j.csi.2007.10.007
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.P.1
Wang, S.S.2
-
26
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
DOI 10.1109/TMC.2007.70753, 4358997
-
K. Ren W. Lou Y. Zhang 2008 LEDS: providing location-aware end-to-end data security in wireless sensor networks IEEE Trans. Mob. Comput. 7 5 585 598 10.1109/TMC.2007.70753 (Pubitemid 351454006)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
27
-
-
70349690087
-
Secure Range Queries in Tiered Sensor Networks
-
[doi:10.1109/INFCOM.2009.5062005]
-
Shi, J.; Zhang, R.; Zhang, Y.; 2009. Secure Range Queries in Tiered Sensor Networks. IEEE INFOCOM, p.945-953. [doi:10.1109/INFCOM.2009.5062005]
-
(2009)
IEEE INFOCOM
, pp. 945-953
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
28
-
-
49849096355
-
Efficient multi-server authentication scheme based on one-way hash function without verification table
-
10.1016/j.cose.2008.04.001
-
J.L. Tsai 2008 Efficient multi-server authentication scheme based on one-way hash function without verification table Comput. & Secur. 27 3-4 115 121 10.1016/j.cose.2008.04.001
-
(2008)
Comput. & Secur.
, vol.27
, Issue.34
, pp. 115-121
-
-
Tsai, J.L.1
-
29
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
DOI 10.1109/SUTC.2006.1636182, 1636182, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
K.H.M. Wong Y. Zheng J.N. Cao S.W. Wang 2006 A Dynamic User Authentication Scheme for Wireless Sensor Networks IEEE Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing 1 244 251 10.1109/SUTC.2006. 1636182 (Pubitemid 44888942)
-
(2006)
Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
30
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
10.1109/LCOMM.2008.080283
-
C.C. Wu W.B. Lee W.J. Tsaur 2008 A secure authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 12 10 722 723 10.1109/LCOMM.2008.080283
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
31
-
-
68949149518
-
Security flaws in authentication protocols with anonymity for wireless environments
-
10.4218/etrij.09.0209.0026
-
J. Xu D. Feng 2009 Security flaws in authentication protocols with anonymity for wireless environments ETRI J. 31 4 460 462 10.4218/etrij.09.0209. 0026
-
(2009)
ETRI J.
, vol.31
, Issue.4
, pp. 460-462
-
-
Xu, J.1
Feng, D.2
-
32
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
10.1109/LCOMM.2009.081821
-
P. Zeng Z. Cao K.K. Choo S. Wang 2009 On the anonymity of some authentication schemes for wireless communications IEEE Commun. Lett. 13 3 170 171 10.1109/LCOMM.2009.081821
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.K.3
Wang, S.4
-
34
-
-
33947309703
-
Secure localization and authentication in ultra-wideband sensor networks
-
DOI 10.1109/JSAC.2005.863855
-
Y. Zhang W. Liu Y. Fang D. Wu 2006 Secure localization and authentication in ultra-wideband sensor networks IEEE J. Sel. Areas Commun. 24 4 829 835 10.1109/JSAC.2005.863855 (Pubitemid 46438080)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.4
, pp. 829-835
-
-
Zhang, Y.1
Liu, W.2
Fang, Y.3
Wu, D.4
-
35
-
-
34547411877
-
A two-layer key establishment scheme for wireless sensor networks
-
DOI 10.1109/TMC.2007.1008
-
Y. Zhou Y. Fang 2007 A two-layer key establishment scheme for wireless sensor networks IEEE Trans. Mob. Comput. 6 9 1009 1020 10.1109/TMC.2007.1008 (Pubitemid 47171282)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.9
, pp. 1009-1020
-
-
Zhou, Y.1
Fang, Y.2
-
36
-
-
33750012404
-
Access control in wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.014, PII S1570870506000497, Security Issues in Sensor and Ad Hoc Networks
-
Y. Zhou Y. Zhang Y. Fang 2007 Access control in wireless sensor networks Ad Hoc Networks 5 1 3 13 10.1016/j.adhoc.2006.05.014 (Pubitemid 44573007)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 3-13
-
-
Zhou, Y.1
Zhang, Y.2
Fang, Y.3
|