-
2
-
-
0036688074
-
A survey on sensor networks
-
10.1109/MCOM.2002.1024422
-
Akyildiz, I. F.; Su, W.; Sankarasubramaniam, Y.; and Cyirci, E.; A survey on sensor networks. IEEE Communications Magazine 40(8):102-114, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cyirci, E.4
-
3
-
-
0032749897
-
Future developments on devices for animal radio frequency identification
-
10.1016/S0168-1699(99)00041-1
-
Jansen, M. B.; and Eradus, W.; Future developments on devices for animal radio frequency identification. Computer and Electronics in Agriculture 24(1-2):109-117, 1999.
-
(1999)
Computer and Electronics in Agriculture
, vol.24
, Issue.1-2
, pp. 109-117
-
-
Jansen, M.B.1
Eradus, W.2
-
5
-
-
0026153410
-
Remote password authentication with smart cards
-
10.1049/ip-e.1991.0022
-
Chang, C. C.; and Wu, T. C.; Remote password authentication with smart cards. IEEE Computers and Digital Techniques 138(3):165-168, 1991.
-
(1991)
IEEE Computers and Digital Techniques
, vol.138
, Issue.3
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
7
-
-
0000694693
-
A remote login authentication scheme based on the digital signature method
-
1684696 0923.68049 10.1080/00207169908804781
-
Hwang, M. S.; A remote login authentication scheme based on the digital signature method. International Journal of Computer Mathematics 70(4):657-666, 1999.
-
(1999)
International Journal of Computer Mathematics
, vol.70
, Issue.4
, pp. 657-666
-
-
Hwang, M.S.1
-
8
-
-
0032669728
-
Cryptanalysis of a remote login authentication scheme
-
10.1016/S0140-3664(99)00036-5
-
Hwang, M. S.; Cryptanalysis of a remote login authentication scheme. Computer Communications 22(8):742-744, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 742-744
-
-
Hwang, M.S.1
-
10
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
10.1109/30.826377
-
Hwang, M. S.; and Li, L. H.; A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(1):28-30, 2000.
-
(2000)
IEEE Transactions on Consumer Electronics
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
11
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Wong, K. H. M.; Zheng, Y.; Cao, J.; and Wang, S.; A dynamic user authentication scheme for wireless sensor networks. IEEE International Conference on Sensor Network Ubiquitous, and Trustworthy Computing 1:318-327, 2006.
-
(2006)
IEEE International Conference on Sensor Network Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 318-327
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
13
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
10.1109/TWC.2008.080128
-
Das, M. L.; Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3):1086-1090, 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
14
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
10.3390/s100302450
-
Khan, M. K.; and Alghathbar, K.; Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 10(3):2450-2459, 2010.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
15
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
Vaidya, B.; Makrakis, D.; and Mouftah, H. T.; Improved two-factor user authentication in wireless sensor networks. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, 600-606, 2010.
-
(2010)
IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
16
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Watro, R.; Kong, D.; Cuti, S.; Gardiner, C.; Lynn, C.; and Kruus, P.; TinyPK: securing sensor networks with public key technology. Proceding of the 2nd ACM Workshop Security of Ad Hoc Sensor Networks, 59-64, 2004.
-
(2004)
Proceding of the 2nd ACM Workshop Security of Ad Hoc Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
17
-
-
67650702447
-
A traffic load-aware energy efficient protocol for wireless sensor networks
-
Wu, F. N.; Li, I. H.; and Liao, I. E.; A traffic load-aware energy efficient protocol for wireless sensor networks. Proceeding of the International Conference on Mobile Technology, Applications, and System, 2008.
-
(2008)
Proceeding of the International Conference on Mobile Technology, Applications, and System
-
-
Wu, F.N.1
Li, I.H.2
Liao, I.E.3
|