-
1
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
2-s2.0-59649083248 10.1016/j.comcom.2008.11.008
-
Wang Y.-Y., Liu J.-Y., Xiao F.-X., Dan J., A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009 32 4 583 585 2-s2.0-59649083248 10.1016/j.comcom.2008.11.008
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.-Y.1
Liu, J.-Y.2
Xiao, F.-X.3
Dan, J.4
-
2
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
-
2-s2.0-78751642788 10.1016/j.comcom.2010.02.011
-
Khan M. K., Kim S.-K., Alghathbar K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Computer Communications 2011 34 3 305 309 2-s2.0-78751642788 10.1016/j.comcom.2010.02.011
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.-K.2
Alghathbar, K.3
-
3
-
-
84866619118
-
An improved efficient remote password authentication scheme with smart card over insecure network
-
Kumar M., Gupta M. K., Kumari S., An improved efficient remote password authentication scheme with smart card over insecure network. International Journal of Network Security 2011 13 3 167 177
-
(2011)
International Journal of Network Security
, vol.13
, Issue.3
, pp. 167-177
-
-
Kumar, M.1
Gupta, M.K.2
Kumari, S.3
-
4
-
-
84866625525
-
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
-
10.2478/s13537-012-0003-y
-
Kumari S., Gupta M. K., Kumar M., Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012 2 1 60 75 10.2478/s13537-012-0003-y
-
(2012)
Central European Journal of Computer Science
, vol.2
, Issue.1
, pp. 60-75
-
-
Kumari, S.1
Gupta, M.K.2
Kumar, M.3
-
5
-
-
84906780054
-
More efficient key-hash based fingerprint remote authentication scheme using mobile device
-
10.1007/s00607-013-0308-2
-
Khan M. K., Kumari S., Gupta M. K., More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 2013 10.1007/s00607-013-0308-2
-
(2013)
Computing
-
-
Khan, M.K.1
Kumari, S.2
Gupta, M.K.3
-
6
-
-
84914669082
-
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
-
10.1002/dac.2590
-
Kumari S., Khan M. K., Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems 2013 10.1002/dac.2590
-
(2013)
International Journal of Communication Systems
-
-
Kumari, S.1
Khan, M.K.2
-
7
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
June 2006 Taichung, Taiwan 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Wong K. H. M., Yuan Z., Jiannong C., Shengwei W., A dynamic user authentication scheme for wireless sensor networks. 1 Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing June 2006 Taichung, Taiwan 318 327 2-s2.0-33845458336 10.1109/SUTC.2006.1636182
-
Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 318-327
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
8
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
November 2007 Washington, DC, USA 2-s2.0-39349093196 10.1109/GLOCOM.2007. 190
-
Tseng H.-R., Jan R.-H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks. Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07) November 2007 Washington, DC, USA 986 990 2-s2.0-39349093196 10.1109/GLOCOM.2007.190
-
Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM '07)
, pp. 986-990
-
-
Tseng, H.-R.1
Jan, R.-H.2
Yang, W.3
-
9
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
2-s2.0-62949130774 10.1109/TWC.2008.080128
-
Das M. L., Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009 8 3 1086 1090 2-s2.0-62949130774 10.1109/TWC.2008.080128
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
10
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
2-s2.0-77956388579 10.1002/dac.1097
-
Vaidya B., Rodrigues J. J. P. C., Park J. H., User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems 2010 23 9-10 1201 1222 2-s2.0-77956388579 10.1002/dac.1097
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.9-10
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.P.C.2
Park, J.H.3
-
12
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
2-s2.0-77955495427 10.3390/s100302450
-
Khan M. K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010 10 3 2450 2459 2-s2.0-77955495427 10.3390/s100302450
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
13
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
2-s2.0-78650459565
-
He D., Gao Y., Chan S., Chen C., Bu J., An enhanced two-factor user authentication scheme in wireless sensor networks. Ad-Hoc & Sensor Wireless Networks 2010 10 4 1 11 2-s2.0-78650459565
-
(2010)
Ad-Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 1-11
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
15
-
-
84856227791
-
Body area network for ubiquitous healthcare applications: Theory and implementation
-
10.1007/s10916-011-9787-x
-
Ullah S., Kwak K. S., Body area network for ubiquitous healthcare applications: theory and implementation. Journal of Medical Systems 2011 35 5 1243 1244 10.1007/s10916-011-9787-x
-
(2011)
Journal of Medical Systems
, vol.35
, Issue.5
, pp. 1243-1244
-
-
Ullah, S.1
Kwak, K.S.2
-
16
-
-
84864035796
-
A comprehensive survey of wireless body area networks - On PHY, MAC, and network layers solutions
-
2-s2.0-77955537164 10.1007/s10916-010-9571-3
-
Ullah S., Higgins H., Braem B., Latre B., Blondia C., Moerman I., Saleem S., Rahman Z., Kwak K. S., A comprehensive survey of wireless body area networks-on PHY, MAC, and network layers solutions. Journal of Medical Systems 2012 36 3 1065 1094 2-s2.0-77955537164 10.1007/s10916-010-9571-3
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.3
, pp. 1065-1094
-
-
Ullah, S.1
Higgins, H.2
Braem, B.3
Latre, B.4
Blondia, C.5
Moerman, I.6
Saleem, S.7
Rahman, Z.8
Kwak, K.S.9
-
17
-
-
84860122221
-
Multi-modal sensing M2M healthcare service in WSN
-
2-s2.0-84860122221
-
Chung W.-Y., Multi-modal sensing M2M healthcare service in WSN. KSII Transactions on Internet and Information Systems 2012 6 4 1090 1105 2-s2.0-84860122221
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.4
, pp. 1090-1105
-
-
Chung, W.-Y.1
-
18
-
-
84863271667
-
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
2-s2.0-84857578365 10.3390/s120201625
-
Kumar P., Lee S.-G., Lee H.-J., E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012 12 2 1625 1647 2-s2.0-84857578365 10.3390/s120201625
-
(2012)
Sensors
, vol.12
, Issue.2
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.-G.2
Lee, H.-J.3
-
19
-
-
84878471679
-
Cryptanalysis of an 'efficient-strong authentication protocol (e-sap) for healthcare applications using wireless medical sensor networks'
-
Khan M. K., Kumari S., Singh P., Cryptanalysis of an 'efficient-strong authentication protocol (e-sap) for healthcare applications using wireless medical sensor networks'. KSII Transactions on Internet and Information Systems 2013 7 5 967 979
-
(2013)
KSII Transactions on Internet and Information Systems
, vol.7
, Issue.5
, pp. 967-979
-
-
Khan, M.K.1
Kumari, S.2
Singh, P.3
-
21
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
10.1002/dac.1158
-
Chen C., He D., Chan S., Bu J., Gao Y., Fan R., Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011 24 3 347 362 10.1002/dac.1158
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
23
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
2-s2.0-67349253018 10.1109/JSAC.2009.090502
-
Lin X., Lu R., Shen X., Nemoto Y., Kato N., SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications 2009 27 4 365 378 2-s2.0-67349253018 10.1109/JSAC.2009.090502
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
24
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, Calif, USA
-
Kocher P., Jaffe J., Jun B., Differential power analysis. Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99) 1999 Santa Barbara, Calif, USA 388 397
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
25
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges T. S., Dabbish E. A., Sloan R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002 51 5 541 552 2-s2.0-0036566408 10.1109/TC.2002.1004593 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|