-
1
-
-
84862759080
-
-
Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; November
-
Advanced Encryption Standard (AES). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; November 2001. 〈 http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf 〉.
-
(2001)
-
-
-
2
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci Wireless sensor networks: a survey Computer Networks 38 4 2002 393 422 (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, California
-
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, California; 2003. p. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
4
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T.-H. Chen, and W.-K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI Journal 32 5 2010 704 712
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.-H.1
Shih, W.-K.2
-
5
-
-
33750111807
-
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.011, PII S157087050600045X, Security Issues in Sensor and Ad Hoc Networks
-
Y. Cheng, and D.P. Agrawal An improved key distribution mechanism for large-scale hierarchical wireless sensor networks Ad Hoc Networks 5 1 2007 35 48 (Pubitemid 44592580)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 35-48
-
-
Cheng, Y.1
Agrawal, D.P.2
-
6
-
-
0013044825
-
-
Crossbow Technology Inc. Accessed on September
-
Crossbow Technology Inc. 2011. Wireless sensor networks, 〈 http://www.xbow.com 〉 Accessed on September.
-
(2011)
Wireless Sensor Networks
-
-
-
10
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks IEEE Transactions on Wireless Communications 8 3 2009 1086 1090
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
13
-
-
37249050375
-
Using auxiliary sensors for pairwise key establishment in WSN
-
NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings LNCS
-
Dong Q, Liu D. Using auxiliary sensors for pairwise key establishment in WSN. In: Proceedings of IFIP international conferences on networking (Networking 2007), Lecture notes in computer science (LNCS), vol. 4479; 2007. p. 251-62. (Pubitemid 350271053)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4479
, pp. 251-262
-
-
Dong, Q.1
Liu, D.2
-
15
-
-
78650387249
-
A secure and efficient user authentication protocol for two-tieres wireless sensor networks
-
Fan R, Ping L-D, Fu J-Q, Pan X-Z. A secure and efficient user authentication protocol for two-tieres wireless sensor networks. In: Second Pacific-Asia conference on circuits, communications and system (PACCS 2010); 2010. p. 425-8.
-
(2010)
Second Pacific-Asia Conference on Circuits, Communications and System (PACCS 2010)
, pp. 425-428
-
-
Fan, R.1
Ping, L.-D.2
Fu, J.-Q.3
Pan, X.-Z.4
-
16
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc & Sensor Wireless Networks 10 4 2010
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
18
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 2010 2450 2459
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
20
-
-
84862773089
-
Improvement of Dass two-factor authentication protocol in wireless sensor networks
-
Report 2009/631
-
Nyang DH, Lee M-K. Improvement of Dass two-factor authentication protocol in wireless sensor networks. In: Cryptology ePrint Archive. Report 2009/631; 2009.
-
(2009)
Cryptology EPrint Archive
-
-
Nyang, D.H.1
Lee, M.-K.2
-
21
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
Parno B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: IEEE symposium on security and privacy; 8-11 May 2005. p. 49-63. (Pubitemid 41543646)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R.L. Rivest, A. Shamir, and L.M. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 1978 120 126 (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
0003629991
-
-
FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; April
-
Secure hash standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce; April 1995.
-
(1995)
Secure Hash Standard
-
-
-
24
-
-
84862757576
-
-
Sun SPOT Accessed on September
-
Sun SPOT. 2011. Wireless sensor networks and beyond. 〈 http://www.sunspotworld.com 〉 Accessed on September.
-
(2011)
Wireless Sensor Networks and beyond
-
-
-
27
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington, DC, USA; October
-
Watro R, Kong D, Cuti S, Gardiner C, Lynn C, Kruus P. TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, SASN 2004, Washington, DC, USA; October 2004. p. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
28
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
DOI 10.1109/SUTC.2006.1636182, 1636182, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
Wong K, Zheng Y, Cao J, Wang S. A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, IEEE Computer Society; 2006. p. 244-51. (Pubitemid 44888942)
-
(2006)
Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.2006
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
30
-
-
77952973912
-
Localized multicast: Efficient and distributed replica detection in large-scale sensor networks
-
B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang Localized multicast: efficient and distributed replica detection in large-scale sensor networks IEEE Transactions on Mobile Computing 9 7 2010 913 926
-
(2010)
IEEE Transactions on Mobile Computing
, vol.9
, Issue.7
, pp. 913-926
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
Roy, S.4
Wang, L.5
|