-
1
-
-
79960755996
-
A single mobile target tracking in Voronoi-based clustered wireless sensor network
-
Chen JH, Salim MB, Matsumoto M (2011) A single mobile target tracking in Voronoi-based clustered wireless sensor network. J Inf Process Syst 7(1):17-28
-
(2011)
J Inf Process Syst
, vol.7
, Issue.1
, pp. 17-28
-
-
Chen, J.H.1
Salim, M.B.2
Matsumoto, M.3
-
2
-
-
84255212842
-
Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks
-
Kumar D, Aseri TC, Patel RB (2011) Multi-hop communication routing (MCR) protocol for heterogeneous wireless sensor networks. Int J Inf Technol Commun Converg 1(2):130-145
-
(2011)
Int J Inf Technol Commun Converg
, vol.1
, Issue.2
, pp. 130-145
-
-
Kumar, D.1
Aseri, T.C.2
Patel, R.B.3
-
3
-
-
84875527298
-
Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks
-
Zhao G, Kumar A (2011) Lifetime-aware geographic routing under a realistic link layer model in wireless sensor networks. Int J Inf Technol Commun Converg 1(3):297-317
-
(2011)
Int J Inf Technol Commun Converg
, vol.1
, Issue.3
, pp. 297-317
-
-
Zhao, G.1
Kumar, A.2
-
4
-
-
79957944903
-
Secure key management protocol in the wireless sensor network
-
Jeong YS, Lee SH (2006) Secure key management protocol in the wireless sensor network. J Inf Process Syst 2(1):48-51
-
(2006)
J Inf Process Syst
, vol.2
, Issue.1
, pp. 48-51
-
-
Jeong, Y.S.1
Lee, S.H.2
-
5
-
-
84856665180
-
Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
-
Ponomarchuk Y, Seo DW (2010) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J Converg 1(1):35-42
-
(2010)
J Converg
, vol.1
, Issue.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.W.2
-
6
-
-
84867615498
-
Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs
-
Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. J Converg 2(1):23-30
-
(2011)
J Converg
, vol.2
, Issue.1
, pp. 23-30
-
-
Sarkar, P.1
Saha, A.2
-
8
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
ACM: New York, USA
-
Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of Ad Hoc and sensor networks-SASN'04, ACM: New York, USA, p 59-64
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor networks-SASN'04
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
10
-
-
77950168413
-
An authentication protocol for sensor networks using pairings
-
IEEE Computer Society
-
Moises SR, Gina GG, Gonzalo DS (2009) An authentication protocol for sensor networks using pairings. In: Proceedings of international conference on electrical, communications, and computers, IEEE Computer Society, p 168-172
-
(2009)
Proceedings of International Conference on Electrical, Communications, and Computers
, pp. 168-172
-
-
Moises, S.R.1
Gina, G.G.2
Gonzalo, D.S.3
-
11
-
-
78751642743
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
10.1016/j.comcom.2010.05.013
-
Oliveira LB, Aranha DF, Gouvêa CPL, Scott M, Câmara DF, López J, Dahab R (2011) TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput Commun 34(3):485-493
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 485-493
-
-
Oliveira, L.B.1
Aranha, D.F.2
Gouvêa, C.P.L.3
Scott, M.4
Câmara, D.F.5
López, J.6
Dahab, R.7
-
12
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
IEEE Computer Society
-
Wong KHM, Zheng Y, Cao JN, Wang SW (2006) A dynamic user authentication scheme for wireless sensor networks. In: Proceedings of IEEE international conference on sensor networks, ubiquitous, and trustworthy computing-SUTC'06, IEEE Computer Society, p 244-251
-
(2006)
Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy computing-SUTC'06
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.N.3
Wang, S.W.4
-
16
-
-
74049156258
-
Robust dynamic user authentication scheme for wireless sensor networks
-
ACM, New York, USA
-
Vaidya B, Silva JS, Rodrigues JJPC (2009) Robust dynamic user authentication scheme for wireless sensor networks. In: Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks-Q2SWinet'09, ACM, New York, USA, p 88-91
-
(2009)
Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile networks-Q2SWinet'09
, pp. 88-91
-
-
Vaidya, B.1
Silva, J.S.2
Rodrigues, J.J.P.C.3
-
17
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
10.1109/TWC.2008.080128
-
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086-1090
-
(2009)
IEEE Trans Wirel Commun
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
18
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
10.3390/s100302450
-
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 10(3):2450-2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
19
-
-
84958769993
-
Side channel cryptanalysis of product ciphers
-
Springer-Verlag, Berlin, Germany, LNCS
-
Kelsey J, Schneier B, Wagner D, Hall C (1998) Side channel cryptanalysis of product ciphers. In: Proceedings of 5th european symposium on research in computer security-ESORICS'98, Springer-Verlag, Berlin, Germany, LNCS 1485, p 97-110
-
(1998)
Proceedings of 5th European Symposium on Research in Computer security-ESORICS'98
, vol.1485
, pp. 97-110
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
20
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag, Berlin, Germany, LNCS
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of 19th annual international cryptology conference: advances in cryptology-CRYPTO'99, Springer-Verlag, Berlin, Germany, LNCS 1666, p 388-397
-
(1999)
Proceedings of 19th Annual International Cryptology Conference: Advances in cryptology-CRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
21
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
10.1109/49.223865
-
Li G, Lomas MA, Needham RM, Saltzer JH (1993) Protecting poorly chosen secrets from guessing attacks. IEEE J Sel Areas Commun 11(5):648-656
-
(1993)
IEEE J Sel Areas Commun
, vol.11
, Issue.5
, pp. 648-656
-
-
Li, G.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
22
-
-
71849087704
-
Public-key cryptography and password protocols
-
10.1145/322510.322514
-
Halevi S, Krawczyk H (1999) Public-key cryptography and password protocols. ACM Trans Inf Syst Secur 2(3):230-268
-
(1999)
ACM Trans Inf Syst Secur
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
23
-
-
27144545000
-
Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
-
2175277 1083.94016 10.1016/j.amc.2005.01.013
-
Sun DZ, Zhong JD, Sun Y (2005) Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme. Appl Math Comput 170(2):1185-1193
-
(2005)
Appl Math Comput
, vol.170
, Issue.2
, pp. 1185-1193
-
-
Sun, D.Z.1
Zhong, J.D.2
Sun, Y.3
-
24
-
-
67649386419
-
Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
10.1109/TIE.2009.2016508
-
Sun DZ, Huai JP, Sun JZ, Li JX, Zhang JW, Feng ZY (2009) Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards. IEEE Trans Ind Electron 56(6):2284-2291
-
(2009)
IEEE Trans Ind Electron
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Li, J.X.4
Zhang, J.W.5
Feng, Z.Y.6
-
25
-
-
39549112119
-
An efficient modular exponentiation algorithm against simple power analysis attacks
-
1152.28321 10.1109/TCE.2007.4429275
-
Sun DZ, Huai JP, Sun JZ, Cao ZF (2007) An efficient modular exponentiation algorithm against simple power analysis attacks. IEEE Trans Consum Electron 53(4):1718-1723
-
(2007)
IEEE Trans Consum Electron
, vol.53
, Issue.4
, pp. 1718-1723
-
-
Sun, D.Z.1
Huai, J.P.2
Sun, J.Z.3
Cao, Z.F.4
-
26
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag, Berlin, Germany, LNCS
-
Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Proceedings of 13th annual international cryptology conference: advances in cryptology-CRYPTO'93, Springer-Verlag, Berlin, Germany, LNCS 773, p 232-249
-
(1994)
Proceedings of 13th Annual International Cryptology Conference: Advances in cryptology-CRYPTO'93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
27
-
-
57049137188
-
A new formal proof model for RFID location privacy
-
Springer-Verlag, Berlin, Germany, LNCS
-
Ha J, Moon S, Zhou J, Ha J (2008) A new formal proof model for RFID location privacy. In: Proceedings of european symposium on research in computer security-ESORICS'08, Springer-Verlag, Berlin, Germany, LNCS 5283, p 267-281
-
(2008)
Proceedings of European Symposium on Research in Computer security-ESORICS'08
, vol.5283
, pp. 267-281
-
-
Ha, J.1
Moon, S.2
Zhou, J.3
Ha, J.4
-
28
-
-
72449181354
-
Defining strong privacy for RFID
-
Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur 13(1): 7:1-7:23
-
(2009)
ACM Trans Inf Syst Secur
, vol.13
, Issue.1
, pp. 71-723
-
-
Juels, A.1
Weis, S.A.2
|