-
1
-
-
80051956974
-
Smart home based on wireless sensor-actuator networks
-
SUN Yan, CHEN Qiang, LUO Hong. Smart home based on wireless sensor-actuator networks [J]. China Communications, 2011, 8(1): 102-109.
-
(2011)
China Communications
, vol.8
, Issue.1
, pp. 102-109
-
-
Sun, Y.1
Chen, Q.2
Luo, H.3
-
2
-
-
84855481512
-
Improved implementation and evaluation of wireless sensor networks in intelligent building
-
DUAN Junqi, ZHANG Sidong, ZHENG Tao. Improved implementation and evaluation of wireless sensor networks in intelligent building [J]. China Communications, 2011, 8(8): 64-71.
-
(2011)
China Communications
, vol.8
, Issue.8
, pp. 64-71
-
-
Duan, J.1
Zhang, S.2
Zheng, T.3
-
3
-
-
77956022266
-
Dynamic cluster key management scheme on wireless sensor networks
-
PEI Qingqi, LI Hongning, PANG Liaojun, et al. Dynamic cluster key management scheme on wireless sensor networks[J]. China Communications, 2010, 7(1): 73-79.
-
(2010)
China Communications
, vol.7
, Issue.1
, pp. 73-79
-
-
Pei, Q.1
Li, H.2
Pang, L.3
-
4
-
-
80052006487
-
An authenticated dynamic key management scheme for clustered sensor networks
-
ZHOU Yajian, PAN Anwei, LI Jiguo. An authenticated dynamic key management scheme for clustered sensor networks[J]. China Communications, 2010, 7(4): 7-17.
-
(2010)
China Communications
, vol.7
, Issue.4
, pp. 7-17
-
-
Zhou, Y.1
Pan, A.2
Li, J.3
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
DAS M. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3): 1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.1
-
6
-
-
79955690469
-
Improvement of das's two-factor authentication protocol in wireless sensor networks
-
NYANG D, LEE M. Improvement of das's two-factor authentication protocol in wireless sensor networks [EB/OL]. http://eprint.iacr.org/2009/631.pdf.
-
-
-
Nyang, D.1
Lee, M.2
-
7
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
HE Daojing, GAO Yi, CHAN S, et al. An enhanced two-factor user authentication scheme in wireless sensor networks [J]. International Journal Ad Hoc Sensor Wireless Network, 2010, 10(4): 361-371.
-
(2010)
International Journal Ad Hoc Sensor Wireless Network
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
-
8
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
CHEN T, SHIH W. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5): 704-712.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.1
Shih, W.2
-
9
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
KHAN M, ALGHATHBAR K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks[J]. Sensors, 2010, 10(3): 2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.1
Alghathbar, K.2
-
10
-
-
79958799640
-
Cryptanalysis of a two-factor user authentication scheme in wireless sensor networks
-
TAN Z. Cryptanalysis of a two-factor user authentication scheme in wireless sensor networks[J]. Advances in Information Sciences and Service Sciences, 2011, 3(4): 117-126.
-
(2011)
Advances in Information Sciences and Service Sciences
, vol.3
, Issue.4
, pp. 117-126
-
-
Tan, Z.1
-
11
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
YEH H, CHEN T, LIU P, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2011, 11(5): 4767-4779.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.1
Chen, T.2
Liu, P.3
-
12
-
-
80052427734
-
Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks
-
June 20-22, 2011, London, UK. IEEE Press
-
KUMAR P, LEE H. Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks [C]//Proceedings of the IEEE Wireless Advanced: June 20-22, 2011, London, UK. IEEE Press, 2011: 241-245.
-
(2011)
Proceedings of the IEEE Wireless Advanced
, pp. 241-245
-
-
Kumar, P.1
Lee, H.2
-
13
-
-
79957718973
-
RUASN: A robust user authentication framework for wireless sensor networks
-
KUMAR P, CHOUDHURY A, SAIN M, et al. RUASN: A robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 5020-5046
-
-
Kumar, P.1
Choudhury, A.2
Sain, M.3
-
15
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
MESSERGES T, DABBISH E A, SLOAN R. Examining smart card security under the threat of power analysis attacks[J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.A.2
Sloan, R.3
-
17
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
YANG Guomin, WONG D, WANG Huaxiong, et al. Two-factor mutual authentication based on smart cards and passwords[J]. Journal of Computer and System Sciences, 2008, 74(7): 1160-1172.
-
(2008)
Journal of Computer and System Sciences
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.2
Wang, H.3
-
18
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
WU Shuhua, ZHU Yuefei, PU Qiong. Robust smart-cards-based user authentication scheme with user anonymity[J]. Security and Communication Networks, 2011, 5(2): 236-248.
-
(2011)
Security and Communication Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
19
-
-
84878975055
-
An enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
DOI: 10.1007/s11277-012-0535-4.
-
JIANG Qi, MA Jianfeng, LI Guangsong, et al. An enhanced authentication scheme with anonymity for roaming service in global mobility networks [J]. Wireless Personal Communications, 2012, DOI: 10.1007/s11277-012-0535-4.
-
(2012)
Wireless Personal Communications
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
-
20
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
DOI: 10.1002/sec.506.
-
HE Debiao, CHEN Jianhua, CHEN Yitao. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography [J]. Security and Communication Networks, 2012, DOI: 10.1002/sec.506.
-
(2012)
Security and Communication Networks
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
21
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
DOI: 10.1007/s10916-011-9658-5.
-
HE Debiao, CHEN Jianhua, ZHANG Rui. A more secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, DOI: 10.1007/s10916-011-9658-5.
-
(2012)
Journal of Medical Systems
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
22
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
LI Xiangxue, QIU Weidong. ZHENG Dong, et al. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards[J]. IEEE Transactions on Industrial Electronics, 2010, 57(2): 793-800.
-
(2010)
IEEE Transactions on Industrial Electronics
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
|