메뉴 건너뛰기




Volumn 2013, Issue , 2013, Pages

A new user authentication protocol for wireless sensor networks using elliptic curves cryptography

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION PROTOCOLS; COMMUNICATION MODULES; COMPUTING POWER; ELLIPTIC CURVES CRYPTOGRAPHY; SECURITY ISSUES; USER AUTHENTICATION; USER AUTHENTICATION PROTOCOLS; WIRELESS SENSOR NETWORK (WSNS);

EID: 84877308219     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2013/730831     Document Type: Article
Times cited : (169)

References (22)
  • 2
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • 2-s2.0-4043122631 10.1109/TCE.2004.1309441
    • Das M. L., Saxena A., Gulati V. P., A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 2004 50 2 629 631 2-s2.0-4043122631 10.1109/TCE.2004.1309441
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 3
    • 1542542636 scopus 로고    scopus 로고
    • Cryptanalysis of a modified remote user authentication scheme using smart cards
    • 2-s2.0-1542542636 10.1109/TCE.2003.1261224
    • Leung K. C., Cheng L. M., Fong A. S., Chan C. K., Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2003 49 4 1243 1245 2-s2.0-1542542636 10.1109/TCE.2003.1261224
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.4 , pp. 1243-1245
    • Leung, K.C.1    Cheng, L.M.2    Fong, A.S.3    Chan, C.K.4
  • 7
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • 2-s2.0-62949130774 10.1109/TWC.2008.080128
    • Das M. L., Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009 8 3 1086 1090 2-s2.0-62949130774 10.1109/TWC.2008.080128
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 8
    • 39349093196 scopus 로고    scopus 로고
    • An improved dynamic user authentication scheme for wireless sensor networks
    • November 2007 Washington, DC, USA 2-s2.0-39349093196 10.1109/GLOCOM.2007. 190
    • Tseng H. R., Jan R. H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) November 2007 Washington, DC, USA 986 990 2-s2.0-39349093196 10.1109/GLOCOM.2007.190
    • Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) , pp. 986-990
    • Tseng, H.R.1    Jan, R.H.2    Yang, W.3
  • 10
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • 2-s2.0-77955495427 10.3390/s100302450
    • Khan M. K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010 10 3 2450 2459 2-s2.0-77955495427 10.3390/s100302450
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 11
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • 2-s2.0-78049334450 10.4218/etrij.10.1510.0134
    • Chen T. H., Shih W. K., A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010 32 5 704 712 2-s2.0-78049334450 10.4218/etrij.10.1510.0134
    • (2010) ETRI Journal , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 12
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography
    • 2-s2.0-79957702363 10.3390/s110504767
    • Yeh H. L., Chen T. H., Liu P. C., Kim T. H., Wei H. W., A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors 2011 11 5 4767 4779 2-s2.0-79957702363 10.3390/s110504767
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.L.1    Chen, T.H.2    Liu, P.C.3    Kim, T.H.4    Wei, H.W.5
  • 13
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer Lecture Notes in Computer Science
    • Miller V. S., Use of elliptic curves in cryptography. 218 Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer 417 426 Lecture Notes in Computer Science
    • (1986) Proceedings of the Advances in Cryptology (CRYPTO '85) , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 14
  • 20
    • 34347393777 scopus 로고    scopus 로고
    • Identity-based key agreement protocols from pairings
    • DOI 10.1007/s10207-006-0011-9
    • Chen L., Cheng Z., Smart N. P., Identity-based key agreement protocols from pairings. International Journal of Information Security 2007 6 4 213 241 2-s2.0-34347393777 10.1007/s10207-006-0011-9 (Pubitemid 47023664)
    • (2007) International Journal of Information Security , vol.6 , Issue.4 , pp. 213-241
    • Chen, L.1    Cheng, Z.2    Smart, N.P.3
  • 21
    • 69549116775 scopus 로고    scopus 로고
    • Identity-based anonymous remote authentication for value-added services in mobile networks
    • 2-s2.0-69549116775 10.1109/TVT.2009.2012389
    • Cao X., Zeng X., Kou W., Hu L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology 2009 58 7 3508 3517 2-s2.0-69549116775 10.1109/TVT.2009.2012389
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.7 , pp. 3508-3517
    • Cao, X.1    Zeng, X.2    Kou, W.3    Hu, L.4
  • 22
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • 2-s2.0-79751538861 10.1016/j.inffus.2011.01.001
    • Debiao H., Jianhua C., Jin H., An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2012 13 3 223 230 2-s2.0-79751538861 10.1016/j.inffus.2011.01.001
    • (2012) Information Fusion , vol.13 , Issue.3 , pp. 223-230
    • Debiao, H.1    Jianhua, C.2    Jin, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.