-
1
-
-
0036688074
-
Survey on saensor network
-
Akyildiz I. F., Su W., Sankarasubramamiam Y., Cayirci E. A., Survey on saensor network. IEEE Communications Magazine 2002 40 102 114
-
(2002)
IEEE Communications Magazine
, vol.40
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramamiam, Y.3
Cayirci, E.A.4
-
2
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
2-s2.0-4043122631 10.1109/TCE.2004.1309441
-
Das M. L., Saxena A., Gulati V. P., A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 2004 50 2 629 631 2-s2.0-4043122631 10.1109/TCE.2004.1309441
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
3
-
-
1542542636
-
Cryptanalysis of a modified remote user authentication scheme using smart cards
-
2-s2.0-1542542636 10.1109/TCE.2003.1261224
-
Leung K. C., Cheng L. M., Fong A. S., Chan C. K., Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2003 49 4 1243 1245 2-s2.0-1542542636 10.1109/TCE.2003.1261224
-
(2003)
IEEE Transactions on Consumer Electronics
, vol.49
, Issue.4
, pp. 1243-1245
-
-
Leung, K.C.1
Cheng, L.M.2
Fong, A.S.3
Chan, C.K.4
-
5
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
October 2004 Washington, DC, USA 2-s2.0-14844304757
-
Watro R., Kong D., Cuti S. F., Gardiner C., Lynn C., Kruus P., TinyPK: securing sensor networks with public key technology. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04) October 2004 Washington, DC, USA 59 64 2-s2.0-14844304757
-
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
6
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
June 2006 Taichung, Taiwan 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Wong K. H. M., Yuan Z., Jiannong C., Shengwei W., A dynamic user authentication scheme for wireless sensor networks. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing June 2006 Taichung, Taiwan 244 251 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
7
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
2-s2.0-62949130774 10.1109/TWC.2008.080128
-
Das M. L., Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009 8 3 1086 1090 2-s2.0-62949130774 10.1109/TWC.2008.080128
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
8
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
November 2007 Washington, DC, USA 2-s2.0-39349093196 10.1109/GLOCOM.2007. 190
-
Tseng H. R., Jan R. H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) November 2007 Washington, DC, USA 986 990 2-s2.0-39349093196 10.1109/GLOCOM.2007.190
-
Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07)
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
10
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
2-s2.0-77955495427 10.3390/s100302450
-
Khan M. K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010 10 3 2450 2459 2-s2.0-77955495427 10.3390/s100302450
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
11
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
2-s2.0-78049334450 10.4218/etrij.10.1510.0134
-
Chen T. H., Shih W. K., A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010 32 5 704 712 2-s2.0-78049334450 10.4218/etrij.10.1510.0134
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
12
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography
-
2-s2.0-79957702363 10.3390/s110504767
-
Yeh H. L., Chen T. H., Liu P. C., Kim T. H., Wei H. W., A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors 2011 11 5 4767 4779 2-s2.0-79957702363 10.3390/s110504767
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
13
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer Lecture Notes in Computer Science
-
Miller V. S., Use of elliptic curves in cryptography. 218 Proceedings of the Advances in Cryptology (CRYPTO '85) 1986 Springer 417 426 Lecture Notes in Computer Science
-
(1986)
Proceedings of the Advances in Cryptology (CRYPTO '85)
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
14
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N., Elliptic curve cryptosystem. Mathematics of Computation 1987 48 203 209
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
15
-
-
11244267013
-
-
New York, NY, USA Springer Lecture Notes in Computer Science
-
Hankerson D., Menezes A., Vanstone S., Guide to Elliptic Curve Cryptography 2004 New York, NY, USA Springer Lecture Notes in Computer Science
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
17
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
October 2004 2-s2.0-14844304757
-
Watro R., Kong D., Cuti S. F., Gardiner C., Lynn C., Kruus P., TinyPK: securing sensor networks with public key technology. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04) October 2004 59 64 2-s2.0-14844304757
-
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
20
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
DOI 10.1007/s10207-006-0011-9
-
Chen L., Cheng Z., Smart N. P., Identity-based key agreement protocols from pairings. International Journal of Information Security 2007 6 4 213 241 2-s2.0-34347393777 10.1007/s10207-006-0011-9 (Pubitemid 47023664)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.4
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
21
-
-
69549116775
-
Identity-based anonymous remote authentication for value-added services in mobile networks
-
2-s2.0-69549116775 10.1109/TVT.2009.2012389
-
Cao X., Zeng X., Kou W., Hu L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transactions on Vehicular Technology 2009 58 7 3508 3517 2-s2.0-69549116775 10.1109/TVT.2009.2012389
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.7
, pp. 3508-3517
-
-
Cao, X.1
Zeng, X.2
Kou, W.3
Hu, L.4
-
22
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
2-s2.0-79751538861 10.1016/j.inffus.2011.01.001
-
Debiao H., Jianhua C., Jin H., An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2012 13 3 223 230 2-s2.0-79751538861 10.1016/j.inffus.2011.01.001
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
Debiao, H.1
Jianhua, C.2
Jin, H.3
|