-
1
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Ubiquitous, Trustworthy Comput., Taichung, Taiwan
-
K.H.M. Wong et al., "A Dynamic User Authentication Scheme for Wireless Sensor Networks," Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Comput., Taichung, Taiwan, 2006.
-
(2006)
Proc. IEEE Int. Conf. Sensor Netw.
-
-
Wong, K.H.M.1
-
2
-
-
84867754544
-
-
accessed 21 Dec. Available:
-
MICAz Datasheet, accessed 21 Dec. 2012. Available: http://www. openautomation.net/uploadsproductos/micaz-datasheet.pdf
-
(2012)
MICAz Datasheet
-
-
-
3
-
-
84861793851
-
-
TelosB Datasheet. http://www.willow.co.uk/TelosB-Datasheet. pdf
-
TelosB Datasheet
-
-
-
4
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das, "Two-Factor User Authentication in Wireless Sensor Networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, 2009, pp. 1086-1090.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
5
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Oct
-
T.-H. Chen and W.-K. Shih, "A Robust Mutual Authentication Protocol for Wireless Sensor Networks," ETRI J., vol. 32, no. 5, Oct. 2010, pp. 704-712.
-
(2010)
ETRI J.
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.-H.1
Shih, W.-K.2
-
6
-
-
79957783970
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He et al., "An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks," Ad Hoc Sensor Wireless Netw., vol. 0, 2010, pp. 1-11.
-
(2010)
Ad Hoc Sensor Wireless Netw.
, vol.0
, pp. 1-11
-
-
He, D.1
-
7
-
-
77955495427
-
Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks
-
M.K. Khan and K. Alghathbar, "Cryptanalysis and Security Improvement of Two-Factor User Authentication in Wireless Sensor Networks," Sensors, 2010, pp. 2450-2459.
-
(2010)
Sensors
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
8
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
Article ID 382810
-
S.-G. Yoo, K.-Y. Park, and J. Kim, "A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks," Int. J. Distr. Sensor Netw., 2012, Article ID 382810.
-
(2012)
Int. J. Distr. Sensor Netw
-
-
Yoo, S.-G.1
Park, K.-Y.2
Kim, J.3
-
9
-
-
84885198232
-
Improvement of das's two-factor authentication protocol in wireless sensor networks
-
accessed 21 Apr
-
D. Nyang and M. Lee, "Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks," Cryptology ePrint Archive 2009/631, accessed 21 Apr. 2012. http://eprint.iacr.org/2009 /631.pdf
-
(2012)
Cryptology ePrint Archive2009/631
-
-
Nyang, D.1
Lee, M.2
-
10
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
Darmstadt, Germany
-
H.F. Huang, Y.F. Chang, and C.H. Liu, "Enhancement of Two-Factor User Authentication in Wireless Sensor Networks," Proc. 6th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process., Darmstadt, Germany, 2010, pp. 27-30.
-
(2010)
Proc. 6th Int. Conf. Intell. Inf. Hiding Multimedia Signal Process.
, pp. 27-30
-
-
Huang, H.F.1
Chang, Y.F.2
Liu, C.H.3
-
11
-
-
79957718973
-
Ruasn: A robust user authentication framework for wireless sensor networks
-
P. Kumar et al., "RUASN: A Robust User Authentication Framework for Wireless Sensor Networks," Sensors, vol. 11, 2011, pp. 5020-5046.
-
(2011)
Sensors
, vol.11
, pp. 5020-5046
-
-
Kumar, P.1
-
12
-
-
78651563219
-
Security weaknesses of dynamic id-based remote user authentication protocol
-
H. Lee et al., "Security Weaknesses of Dynamic ID-Based Remote User Authentication Protocol," World Academy Sci., Eng., Technol., vol. 59, no. 35, 2009, pp. 190-193.
-
(2009)
World Academy Sci., Eng., Technol.
, vol.59
, Issue.35
, pp. 190-193
-
-
Lee, H.1
-
13
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Washington, DC
-
H.R. Tseng, R.H. Jan, and W. Yang, "An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks," IEEE GLOBECOM, Washington, DC, 2007, pp. 986-990.
-
(2007)
IEEE GLOBECOM
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
14
-
-
55849086208
-
Simple dynamic user authentication protocols for wireless sensor networks
-
Cap Esterel, France
-
T.H. Lee, "Simple Dynamic User Authentication Protocols for Wireless Sensor Networks," Proc. 2nd Int. Conf. Sensor Technol. Appl., Cap Esterel, France, 2008, pp. 657-660.
-
(2008)
Proc. 2nd Int. Conf. Sensor Technol. Appl.
, pp. 657-660
-
-
Lee, T.H.1
-
15
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
Reykjavik, Iceland
-
L.-C. Ko, "A Novel Dynamic User Authentication Scheme for Wireless Sensor Networks," Proc. IEEE ISWCS, Reykjavik, Iceland, 2008, pp. 608-612.
-
(2008)
Proc. IEEE ISWCS
, pp. 608-612
-
-
Ko, L.-C.1
-
16
-
-
34250787561
-
Realizing robust user authentication in sensor networks
-
Stockholm, Sweden
-
Z. Benenson, N. Gedicke, and O. Raivio, "Realizing Robust User Authentication in Sensor Networks," Workshop Real-World Wireless Sensor Netw., Stockholm, Sweden, 2005.
-
(2005)
Workshop Real-World Wireless Sensor Netw.
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
17
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in ngn
-
Sept.-Oct
-
B. Vaidya, J.J.P.C. Rodrigues, and J.H. Park, "User Authentication Schemes with Pseudonymity for Ubiquitous Sensor Network in NGN," Int. J. Commun. Syst., vol. 23, issue 9-10, Sept.-Oct. 2010, pp. 1201-1222.
-
(2010)
Int. J. Commun. Syst.
, vol.23
, Issue.9-10
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.P.C.2
Park, J.H.3
-
18
-
-
80053293841
-
Cryptanalysis of robust mutual authentication protocol for wireless sensor networks
-
Banff, Alberta, Canada
-
E.-J. Yoon and K.-Y. Yoo, "Cryptanalysis of Robust Mutual Authentication Protocol for Wireless Sensor Networks," Proc. 10th IEEE Int. Conf. Cog. Inf. Cog. Comput., Banff, Alberta, Canada, 2011, pp. 392-396.
-
(2011)
Proc. 10th IEEE Int. Conf. Cog. Inf. Cog. Comput.
, pp. 392-396
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
19
-
-
80052427734
-
Cryptanalysis on two user authentication protocols using smartcard for wireless sensor networks
-
King's College, London, U.K., June
-
P. Kumar and H.-J. Lee, "Cryptanalysis on Two User Authentication Protocols Using Smartcard for Wireless Sensor Networks," Proc. 7th IEEE Conf. Wireless Adv., King's College, London, U.K., June 2011, pp. 241-245.
-
(2011)
Proc. 7th IEEE Conf. Wireless Adv.
, pp. 241-245
-
-
Kumar, P.1
Lee, H.-J.2
-
20
-
-
78049329614
-
Security enhancement on two remote user authentication schemes using smart cards
-
Apr
-
T.-H. Chen, H.-C. Hsiang, and W.-K. Shih, "Security Enhancement on Two Remote User Authentication Schemes Using Smart Cards," Future Generation Comput. Syst., vol. 27 Apr. 2011, pp. 377-380.
-
(2011)
Future Generation Comput. Syst.
, vol.27
, pp. 377-380
-
-
Chen, T.-H.1
Hsiang, H.-C.2
Shih, W.-K.3
-
22
-
-
84885238174
-
-
accessed 21 Dec. Available:
-
Crossbow Stargate Datasheet, accessed 21 Dec. 2012. Available: http://platformx.sourceforge.net/home.html
-
(2012)
Crossbow Stargate Datasheet
-
-
-
23
-
-
84861039290
-
A wireless sensor network for precise volatile organic compound monitoring
-
Article ID 820716
-
G. Manes et al., "A Wireless Sensor Network for Precise Volatile Organic Compound Monitoring," Int. J. Distr. Sensor Netw., 2012, Article ID 820716.
-
(2012)
Int. J. Distr. Sensor Netw
-
-
Manes, G.1
-
24
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
May
-
X. Lin et al., "SAGE: A Strong Privacy-Preserving Scheme against Global Eavesdropping for eHealth Systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, May 2009, pp. 365-378.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
-
25
-
-
84905854254
-
Design and deployment of industrial sensor networks: Experiences from a semiconductor plant and the north sea
-
2-4 Nov
-
L. Krishnamurthy et al., "Design and Deployment of Industrial Sensor Networks: Experiences from a Semiconductor Plant and the North Sea," Proc. SenSys, San Diego, CA, USA, 2-4 Nov. 2005, pp. 64-75.
-
(2005)
Proc. SenSys, San Diego, CA, USA
, pp. 64-75
-
-
Krishnamurthy, L.1
-
26
-
-
33947675345
-
A two-tiered architecture for real-time communications in large-scale wireless sensor networks: Research challenges
-
July accessed 18 Jan. 2013. Available:
-
A. Koubaa and M. Alves, "A Two-tiered Architecture for Real-Time Communications in Large-Scale Wireless Sensor Networks: Research Challenges," Technical Report (TR-050701), v. 1.0, July 2005, accessed 18 Jan. 2013. Available: http://www. open-zb.net/publications/tr-hurray-050701.pdf
-
(2005)
Technical Report (TR-050701
, vol.10
-
-
Koubaa, A.1
Alves, M.2
-
27
-
-
84994900236
-
A robust password-based authentication scheme for heterogeneous sensor networks
-
H.-R. Tseng, R.-H. Jan, and W. Yang, "A Robust Password-based Authentication Scheme for Heterogeneous Sensor Networks," Commun. Institute Inf. Comput. Mach., vol. 11, no. 3, 2008, pp. 1-13.
-
(2008)
Commun. Institute Inf. Comput. Mach.
, vol.11
, Issue.3
, pp. 1-13
-
-
Tseng, H.-R.1
Jan, R.-H.2
Yang, W.3
-
28
-
-
77955080013
-
Host identity protocol: Identifier/locator split for host mobility identity and multihoming
-
Mar
-
A. Gurtov, M. Komu, and R. Moskowitz, "Host Identity Protocol: Identifier/Locator Split for Host Mobility Identity and Multihoming," Internet Protocol J., vol. 12, no. 1, Mar. 2009, pp. 27-32.
-
(2009)
Internet Protocol J.
, vol.12
, Issue.1
, pp. 27-32
-
-
Gurtov, A.1
Komu, M.2
Moskowitz, R.3
-
29
-
-
84867371233
-
A secure hierarchical key management scheme in wireless sensor networks
-
Article ID547471
-
Y. Zhang et al., "A Secure Hierarchical Key Management Scheme in Wireless Sensor Networks," Int. J. Distr. Sensor Netw., 2012, Article ID547471.
-
(2012)
Int. J. Distr. Sensor Netw
-
-
Zhang, Y.1
-
30
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
Baltimore, MD, USA, Nov. 3-5
-
C. Karlor, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. ACM SenSys, Baltimore, MD, USA, Nov. 3-5, 2004, pp. 162-175.
-
(2004)
Proc. ACM SenSys
, pp. 162-175
-
-
Karlor, C.1
Sastry, N.2
Wagner, D.3
-
31
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility networks
-
C. Chen et al., "Lightweight and Provably Secure User Authentication with Anonymity for the Global Mobility Networks," Int. J. Commun. Syst., vol. 24, no. 3, 2011, pp. 347-362.
-
(2011)
Int. J. Commun. Syst.
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
-
32
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA, Aug
-
P. Kocher, J. Jaffe, and B. Jun, "Differential Power Analysis," Proc. Adv. Cryptology, Santa Barbara, CA, USA, Aug. 1999, pp. 388-397.
-
(1999)
Proc. Adv. Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
33
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attack
-
May
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining Smart-Card Security Under the Threat of Power Analysis Attack," IEEE Trans. Comput., vol. 51, no. 5, May 2002, pp. 541-552.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|