-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38(4): 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
33746373934
-
A novel privacy preserving authentication and access control scheme for pervasive computing environment
-
Ren K, Lou W, Kim K, Deng R. A novel privacy preserving authentication and access control scheme for pervasive computing environment. IEEE Transactions on Vehicular Technology 2006; 55(4): 1373-1384.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1373-1384
-
-
Ren, K.1
Lou, W.2
Kim, K.3
Deng, R.4
-
4
-
-
48049100992
-
-
Query privacy in wireless sensor networks, Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, California, USA
-
Carbunar B, Yu Y, Shi L, Pearce M, Vasudevan V. Query privacy in wireless sensor networks, Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Diego, California, USA, 2007; 203-212.
-
(2007)
, pp. 203-212
-
-
Carbunar, B.1
Yu, Y.2
Shi, L.3
Pearce, M.4
Vasudevan, V.5
-
5
-
-
48649088209
-
-
A group signature based secure and privacy-preserving vehicular communication framework, Proceeding of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska, USA
-
Guo JH, Baugh JP, Wang SQ. A group signature based secure and privacy-preserving vehicular communication framework, Proceeding of the Mobile Networking for Vehicular Environment (MOVE) workshop in conjunction with IEEE INFOCOM, Anchorage, Alaska, USA, 2007; 103-108.
-
(2007)
, pp. 103-108
-
-
Guo, J.H.1
Baugh, J.P.2
Wang, S.Q.3
-
6
-
-
70349658629
-
-
2AC: Distributed privacy preserving access control in sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
-
2AC: Distributed privacy preserving access control in sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 1251-1259.
-
(2009)
, pp. 1251-1259
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
-
7
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
He DJ, Bu JJ, Zhu SC, Chan S, Chen C. Distributed access control with privacy support in wireless sensor networks. IEEE Transaction on Wireless Communications 2011; 10(10): 3472-3481.
-
(2011)
IEEE Transaction on Wireless Communications
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.J.1
Bu, J.J.2
Zhu, S.C.3
Chan, S.4
Chen, C.5
-
8
-
-
63449122349
-
-
Digital signcryption or how to achieve cost (signature & encryption)≪cost (signature)+ cost (encryption), Advances in CRYPTO'97, Santa Barbara, California, USA
-
Zheng YL. Digital signcryption or how to achieve cost (signature & encryption)≪cost (signature)+ cost (encryption), Advances in CRYPTO'97, Santa Barbara, California, USA, 1997; 165-179.
-
(1997)
, pp. 165-179
-
-
Zheng, Y.L.1
-
9
-
-
79960881762
-
-
Distributed privacy-preserving access control in a single-owner multi-user sensor network, IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, Shanghai, China
-
He DJ, Bu JJ, Zhu SC, Yin MJ, Gao Y, Wang HD, Chan S, Chen C. Distributed privacy-preserving access control in a single-owner multi-user sensor network, IEEE International Conference on Computer Communications (INFOCOM) Mini-Conference, Shanghai, China, 2011; 331-335.
-
(2011)
, pp. 331-335
-
-
He, D.J.1
Bu, J.J.2
Zhu, S.C.3
Yin, M.J.4
Gao, Y.5
Wang, H.D.6
Chan, S.7
Chen, C.8
-
11
-
-
33845458336
-
-
A dynamic user authentication scheme for wireless sensor networks, Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, California, USA
-
Wong KHM, Zheng Y, Cao JN, Wang SW. A dynamic user authentication scheme for wireless sensor networks, Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, California, USA, 2006; 244-251.
-
(2006)
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.N.3
Wang, S.W.4
-
12
-
-
39349093196
-
-
An improved dynamic user authentication scheme for wireless sensor networks, Proceedings of IEEE Global Telecommunications Conference (Globecom), Washington, DC, USA
-
Tseng HR, Jan RH, Yang W. An improved dynamic user authentication scheme for wireless sensor networks, Proceedings of IEEE Global Telecommunications Conference (Globecom), Washington, DC, USA, 2007; 986-990.
-
(2007)
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
13
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transaction on Wireless Communication 2009; 8: 1086-1090.
-
(2009)
IEEE Transaction on Wireless Communication
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
14
-
-
77955495427
-
Cryptanalysis and security improvements of 'Two-factor user authentication in wireless sensor networks'
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of 'Two-factor user authentication in wireless sensor networks'. Sensors 2010; 10(3): 2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
15
-
-
78650459565
-
An enhanced two-factor access control scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor access control scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4): 361-371.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
16
-
-
63149087345
-
-
Efficient distributed security for wireless medical sensor networks, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia
-
Morchon OG, Baldus H. Efficient distributed security for wireless medical sensor networks, International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, 2008; 249-254.
-
(2008)
, pp. 249-254
-
-
Morchon, O.G.1
Baldus, H.2
-
17
-
-
14844304757
-
-
Tinypk: securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Nsetworks, Washington, DC, USA
-
Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P. Tinypk: securing sensor networks with public key technology, Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Nsetworks, Washington, DC, USA, 2004; 59-64.
-
(2004)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
18
-
-
20344381294
-
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA
-
Malan D J, Welsh M, Smith Michael. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography, IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA, 2004; 71-80.
-
(2004)
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.3
-
19
-
-
34548302064
-
-
pDCS: security and privacy support for data-centric sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
-
Shao M, Zhu S, Zhang W, Cao G. pDCS: security and privacy support for data-centric sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 1298-1306.
-
(2009)
, pp. 1298-1306
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
20
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li M, Lou W, Ren K. Data security and privacy in wireless body area networks. IEEE Wireless Communication 2010; 17(1): 51-58.
-
(2010)
IEEE Wireless Communication
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
22
-
-
84896506971
-
-
Realizing robust user authentication in sensor networks, Workshop on Real-World Wireless Sensor Networks, Sweden
-
Benenson Z, Gedicke N, Raivio O. Realizing robust user authentication in sensor networks, Workshop on Real-World Wireless Sensor Networks, Sweden, 2005; 135-142.
-
(2005)
, pp. 135-142
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
23
-
-
70349682512
-
-
FDAC: toward fine-grained distributed data access control in wireless sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil
-
Yu S, Ren K, Lou W. FDAC: toward fine-grained distributed data access control in wireless sensor networks, Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009; 963-971.
-
(2009)
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
24
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 1987; 48(177): 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
25
-
-
51349100827
-
-
A security architecture achieving anonymity and traceability in wireless mesh networks, IEEE INFOCOM: The 27th Conference on Computer Communications, Phoenix, AZ, USA
-
Sun JY, Zhang C, Fang YG. A security architecture achieving anonymity and traceability in wireless mesh networks, IEEE INFOCOM: The 27th Conference on Computer Communications, Phoenix, AZ, USA, 2008; 1687-1695.
-
(2008)
, pp. 1687-1695
-
-
Sun, J.Y.1
Zhang, C.2
Fang, Y.G.3
-
26
-
-
0010567510
-
-
Proxy signatures, revisited, International Conference on Information and Communication Security, Lecture Notes in Computer Science, Beijing, China
-
Kim S, Park S, Won D. Proxy signatures, revisited, International Conference on Information and Communication Security, Lecture Notes in Computer Science, Beijing, China, 1997; 223-232.
-
(1997)
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
28
-
-
35048854673
-
-
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, International Conference on Information and Communication Security, ICISC 2003, LNCS, Vol. 2971, Seoul, Korea
-
Chow SSM, Yiu SM, Hui LCK, Chow KP. Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, International Conference on Information and Communication Security, ICISC 2003, LNCS, Vol. 2971, Seoul, Korea, 2004; 352-369.
-
(2004)
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
29
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Barreto P, Libert B, McCullagh N, Quisquater J. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. Advances in Cryptology 2005; 3788: 515-532.
-
(2005)
Advances in Cryptology
, vol.3788
, pp. 515-532
-
-
Barreto, P.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
30
-
-
84958960201
-
-
A practical implementation of elliptic curve cryptosystems over gf(p) on a 16-bit microcomputer, Public Key Cryptography, Pacifico Yokohama, Japan
-
Hasegawa T, Nakajima J, Matsui M. A practical implementation of elliptic curve cryptosystems over gf(p) on a 16-bit microcomputer, Public Key Cryptography, Pacifico Yokohama, Japan, 1998; 182-194.
-
(1998)
, pp. 182-194
-
-
Hasegawa, T.1
Nakajima, J.2
Matsui, M.3
-
31
-
-
25144467465
-
An efficient signcryption scheme with forward secrecy based on elliptic curve
-
Hwang RJ, Lai CH, Su FF. An efficient signcryption scheme with forward secrecy based on elliptic curve. Applied Mathematics and Computation 2004; 167(2005): 870-881.
-
(2004)
Applied Mathematics and Computation
, vol.167
, Issue.2005
, pp. 870-881
-
-
Hwang, R.J.1
Lai, C.H.2
Su, F.F.3
-
32
-
-
35048859269
-
-
Efficient signcryption with key privacy from gap Diffie-Hellman groups, PKC
-
Libert B, Quisquater JJ. Efficient signcryption with key privacy from gap Diffie-Hellman groups, PKC, 2004; 187-200.
-
(2004)
, pp. 187-200
-
-
Libert, B.1
Quisquater, J.J.2
-
33
-
-
33750062561
-
-
ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intelligence and Computing, Wuhan, China
-
Han YL, Yang XY, Wei P. ECGSC: elliptic curve based generalized signcryption, Ubiquitous Intelligence and Computing, Wuhan, China, 2006; 956-965.
-
(2006)
, pp. 956-965
-
-
Han, Y.L.1
Yang, X.Y.2
Wei, P.3
-
34
-
-
78650492723
-
-
Secure and efficient generalized signcryption scheme based on a short ECDSA, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany
-
Zhang CR, Chi L, Zhang YQ. Secure and efficient generalized signcryption scheme based on a short ECDSA, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010; 466-469.
-
(2010)
, pp. 466-469
-
-
Zhang, C.R.1
Chi, L.2
Zhang, Y.Q.3
-
35
-
-
74549125519
-
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
-
Lee XH, Lee S, Butun I, Khalid M, Sankar R, Kim M, Han MH, Lee YK, Lee H. An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communication and Networks, Special Issues on Secure Wireless Networking 2009; 11(6): 599-606.
-
(2009)
Journal of Communication and Networks, Special Issues on Secure Wireless Networking
, vol.11
, Issue.6
, pp. 599-606
-
-
Lee, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
Kim, M.6
Han, M.H.7
Lee, Y.K.8
Lee, H.9
|