-
1
-
-
33750111807
-
An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
-
Y. Cheng, and D. Agrawal An improved key distribution mechanism for large-scale hierarchical wireless sensor networks Ad Hoc Networks 5 1 2007 35 48
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 35-48
-
-
Cheng, Y.1
Agrawal, D.2
-
2
-
-
79957670763
-
A co-commitment based secure data collection scheme for tiered wireless sensor networks
-
Y. Zhao, Y. Zhang, Z. Qin, and T. Znati A co-commitment based secure data collection scheme for tiered wireless sensor networks J. Syst. Archit. 57 6 2011 655 662
-
(2011)
J. Syst. Archit.
, vol.57
, Issue.6
, pp. 655-662
-
-
Zhao, Y.1
Zhang, Y.2
Qin, Z.3
Znati, T.4
-
3
-
-
84878016515
-
A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks
-
G. Maia, D. Guidoni, A. Viana, A. Aquino, R. Mini, and A. Loureiro A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks Ad Hoc Networks 11 5 2013 1588 1602
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.5
, pp. 1588-1602
-
-
Maia, G.1
Guidoni, D.2
Viana, A.3
Aquino, A.4
Mini, R.5
Loureiro, A.6
-
4
-
-
79960062320
-
An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
-
R. Fan, D. He, X. Pan, and L. Ping An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks J. Zhejiang Univ. - Sci. C 12 7 2011 550 560
-
(2011)
J. Zhejiang Univ. - Sci. C
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
He, D.2
Pan, X.3
Ping, L.4
-
5
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
A.K. Das, P. Sharma, S. Chatterjee, and J.K. Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Network Comput. Appl. 35 52 2012 1646 1656
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.52
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
6
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 32 5 2010 704 712
-
(2010)
ETRI J.
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
7
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 3 2010 2450 2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
8
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Networks 10 4 2010 361 371
-
(2010)
Ad Hoc Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
9
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
H. Yeh, T. Chen, P. Liu, T. Kim, and H. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.1
Chen, T.2
Liu, P.3
Kim, T.4
Wei, H.5
-
10
-
-
79953085274
-
Two attacks on a two-factor user authentication in wireless sensor networks
-
C.-C. Lee, C.-T. Li, and S. der Chen Two attacks on a two-factor user authentication in wireless sensor networks Parallel Process. Lett. 21 1 2011 21 26
-
(2011)
Parallel Process. Lett.
, vol.21
, Issue.1
, pp. 21-26
-
-
Lee, C.-C.1
Li, C.-T.2
Der Chen, S.3
-
11
-
-
80052427734
-
Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
-
IEEE
-
P. Kumar, and H. Lee Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks Wireless Advanced 2011 IEEE 241 245
-
(2011)
Wireless Advanced
, pp. 241-245
-
-
Kumar, P.1
Lee, H.2
-
12
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
D. Sun, J. Li, Z. Feng, Z. Cao, and G. Xu On the security and improvement of a two-factor user authentication scheme in wireless sensor networks Pers. Ubiquitous Comput. 17 5 2013 895 905
-
(2013)
Pers. Ubiquitous Comput.
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D.1
Li, J.2
Feng, Z.3
Cao, Z.4
Xu, G.5
-
13
-
-
84872473654
-
Security enhancement of robust user authentication framework for wireless sensor networks
-
Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
-
(2012)
China Commun.
, vol.9
, Issue.10
, pp. 103-111
-
-
Jiang, Q.1
Ma, Z.2
Ma, J.F.3
Li, G.4
-
14
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G.M. Yang, D.S. Wong, H.X. Wang, and X.T. Deng Two-factor mutual authentication based on smart cards and passwords J. Comput. Syst. Sci. 74 7 2008 1160 1172
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.M.1
Wong, D.S.2
Wang, H.X.3
Deng, X.T.4
-
15
-
-
79957718973
-
Ruasn: A robust user authentication framework for wireless sensor networks
-
P. Kumar, A.J. Choudhury, M. Sain, S.M. Lee, and H.J. Lee Ruasn: A robust user authentication framework for wireless sensor networks Sensors 11 5 2011 5020 5046
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 5020-5046
-
-
Kumar, P.1
Choudhury, A.J.2
Sain, M.3
Lee, S.M.4
Lee, H.J.5
-
16
-
-
84863271667
-
E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
P. Kumar, S.-G. Lee, and H.-J. Lee E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 12 2 2012 1625 1647
-
(2012)
Sensors
, vol.12
, Issue.2
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.-G.2
Lee, H.-J.3
-
17
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Network Comput. Appl. 36 1 2013 316 323
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
19
-
-
0012797660
-
WCA: A weighted clustering algorithm for mobile ad hoc networks
-
M. Chatterjee, S.K. Das, and D. Turgut WCA: A weighted clustering algorithm for mobile ad hoc networks Cluster Comput. 5 2 2002 193 204
-
(2002)
Cluster Comput.
, vol.5
, Issue.2
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
20
-
-
24644440576
-
A cluster-based energy balancing scheme in heterogeneous wireless sensor networks
-
P. Lorenz, P. Dini, LNCS Springer Berlin Heidelberg
-
J. Ai, D. Turgut, and L. Boloni A cluster-based energy balancing scheme in heterogeneous wireless sensor networks P. Lorenz, P. Dini, International Conference on Networking (ICN 2005) LNCS vol. 3420 2005 Springer Berlin Heidelberg 467 474
-
(2005)
International Conference on Networking (ICN 2005)
, vol.3420
, pp. 467-474
-
-
Ai, J.1
Turgut, D.2
Boloni, L.3
-
21
-
-
58149202523
-
A genetic algorithm based approach for energy efficient routing in two-tiered sensor networks
-
A. Bari, S. Wazed, A. Jaekel, and S. Bandyopadhyay A genetic algorithm based approach for energy efficient routing in two-tiered sensor networks Ad Hoc Networks 7 4 2009 665 676
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.4
, pp. 665-676
-
-
Bari, A.1
Wazed, S.2
Jaekel, A.3
Bandyopadhyay, S.4
-
22
-
-
84906738412
-
Improved privacy-preserving authentication scheme for roaming service in mobile networks
-
D. Wang, P. Wang, J. Liu, Improved privacy-preserving authentication scheme for roaming service in mobile networks, in: Proceedings of 15th IEEE Wireless Communications and Networking Conference (WCNC 2014), 2014, pp. 1-6. < http://wangdingg.weebly.com/uploads/2/0/3/6/20366987/wcnc2014.pdf >.
-
(2014)
Proceedings of 15th IEEE Wireless Communications and Networking Conference (WCNC 2014)
, pp. 1-6
-
-
Wang, D.1
Wang, P.2
Liu, J.3
-
23
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
10.1155/2012/38281
-
S.G. Yoo, K.Y. Park, and J. Kim A security-performance-balanced user authentication scheme for wireless sensor networks Int. J. Distrib. Sensor Networks 2012 10.1155/2012/38281
-
(2012)
Int. J. Distrib. Sensor Networks
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
-
24
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
10.1002/sec.51
-
B. Vaidya, D. Makrakis, and H. Mouftah Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Networks 2012 10.1002/sec.51
-
(2012)
Secur. Commun. Networks
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
25
-
-
84995943281
-
On the (in)security of some Smart-card-based Password Authentication Schemes for WSN
-
ePrint Archive, Report 2012/581
-
D. Wang, C.-G. Ma, On the (in)security of some Smart-card-based Password Authentication Schemes for WSN, Cryptology ePrint Archive, Report 2012/581, 2012. < http://eprint.iacr.org/2012/581.pdf >.
-
(2012)
Cryptology
-
-
Wang, D.1
Ma, C.-G.2
-
26
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
28
-
-
80051974925
-
Generic side-channel distinguishers: Improvements and limitations
-
P. Rogaway, LNCS Springer Berlin/Heidelberg
-
N. Veyrat-Charvillon, and F.-X. Standaert Generic side-channel distinguishers: improvements and limitations P. Rogaway, CRYPTO 2011 LNCS vol. 6841 2011 Springer Berlin/Heidelberg 354 372
-
(2011)
CRYPTO 2011
, vol.6841
, pp. 354-372
-
-
Veyrat-Charvillon, N.1
Standaert, F.-X.2
-
29
-
-
84867337073
-
Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
-
T.H. Kim, C. Kim, and I. Park Side channel analysis attacks using AM demodulation on commercial smart cards with SEED J. Syst. Softw. 85 12 2012 2899 2908
-
(2012)
J. Syst. Softw.
, vol.85
, Issue.12
, pp. 2899-2908
-
-
Kim, T.H.1
Kim, C.2
Park, I.3
-
30
-
-
84901208306
-
Smart Card Security from a Programming Language and Static Analysis Perspective
-
X. Leroy, Smart Card Security from a Programming Language and Static Analysis Perspective, INRIA Rocquencourt & trusted logic, Tecnical Report, 2013. < http://pauillac.inria.fr/xleroy/talks/language-security-etaps03.pdf >.
-
(2013)
INRIA Rocquencourt & Trusted Logic, Tecnical Report
-
-
Leroy, X.1
-
32
-
-
84901199502
-
Offline dictionary attack on password authentication schemes using smart cards
-
Y. Desmedt, B. Thuraisingham, K. Hamlen, Lecture Notes in Computer Science Springer-Verlag < >
-
D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, Proceedings of 16th Information Security Conference (ISC 2013) Lecture Notes in Computer Science 2013 Springer-Verlag 1 16 < http://wangdingg.weebly.com/uploads/2/0/ 3/6/20366987/isc2013.pdf >
-
(2013)
Proceedings of 16th Information Security Conference (ISC 2013)
, pp. 1-16
-
-
Wang, D.1
Wang, P.2
-
33
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
35
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
IEEE Computer Society
-
J. Bonneau The science of guessing: analyzing an anonymized corpus of 70 million passwords 33th IEEE Symposium on Security and Privacy (S&P 2012) 2012 IEEE Computer Society 538 552
-
(2012)
33th IEEE Symposium on Security and Privacy (S&P 2012)
, pp. 538-552
-
-
Bonneau, J.1
-
36
-
-
77953306210
-
Password strength: An empirical analysis
-
M. Dell'Amico, P. Michiardi, Y. Roudier, Password strength: an empirical analysis, in: Proceedings of 29th IEEE Conference on Computer Communications (INFOCOM 2010). IEEE Communications Society, 2010, pp. 1-9.
-
(2010)
Proceedings of 29th IEEE Conference on Computer Communications (INFOCOM 2010). IEEE Communications Society
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
38
-
-
79956068379
-
Impact of restrictive composition policy on user password choices
-
J. Campbell, W. Ma, and D. Kleeman Impact of restrictive composition policy on user password choices Behav. Inform. Technol. 30 3 2011 379 388
-
(2011)
Behav. Inform. Technol.
, vol.30
, Issue.3
, pp. 379-388
-
-
Campbell, J.1
Ma, W.2
Kleeman, D.3
-
40
-
-
84865012140
-
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
-
IEEE Computer Society
-
P.G. Kelley, S. Komanduri, and M.L. Mazurek Guess again (and again and again): measuring password strength by simulating password-cracking algorithms 33th IEEE Symposium on Security and Privacy (S&P 2012) 2012 IEEE Computer Society 523 537
-
(2012)
33th IEEE Symposium on Security and Privacy (S&P 2012)
, pp. 523-537
-
-
Kelley, P.G.1
Komanduri, S.2
Mazurek, M.L.3
-
42
-
-
84957019437
-
Privacy protection for transactions of digital goods
-
S. Qing, T. Okamoto, J. Zhou, LNCS Springer Berlin/Heidelberg
-
F. Bao, and R. Deng Privacy protection for transactions of digital goods S. Qing, T. Okamoto, J. Zhou, ICICS 2001 LNCS vol. 2229 2001 Springer Berlin/Heidelberg 202 213
-
(2001)
ICICS 2001
, vol.2229
, pp. 202-213
-
-
Bao, F.1
Deng, R.2
-
43
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Indust. Electron. 57 2 2010 793 800
-
(2010)
IEEE Trans. Indust. Electron.
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Zheng, D.3
Chen, K.4
Li, J.5
-
44
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
C. Tang, and D. Wu Mobile privacy in wireless networks-revisited IEEE Trans. Wireless Commun. 7 3 2008 1035 1042
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.2
-
46
-
-
84860376061
-
Dynamic id-based remote user password authentication schemes using smart cards: A review
-
R. Madhusudhan, and R.C. Mittal Dynamic id-based remote user password authentication schemes using smart cards: a review J. Network Comput. Appl. 35 4 2012 1235 1248
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.4
, pp. 1235-1248
-
-
Madhusudhan, R.1
Mittal, R.C.2
-
47
-
-
84864344507
-
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
-
N. Cuppens-Boulahia, F. Cuppens, J. Garcia-Alfaro, LNCS Springer Berlin/Heidelberg
-
D. Wang, C.G. Ma, and P. Wu Secure password-based remote user authentication scheme with non-tamper resistant smart cards N. Cuppens-Boulahia, F. Cuppens, J. Garcia-Alfaro, Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012) LNCS vol. 7371 2012 Springer Berlin/Heidelberg 114 121
-
(2012)
Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012)
, vol.7371
, pp. 114-121
-
-
Wang, D.1
Ma, C.G.2
Wu, P.3
-
48
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
D. He, J. Bu, S. Zhu, S. Chan, and C. Chen Distributed access control with privacy support in wireless sensor networks IEEE Trans. Wireless Commun. 10 10 2011 3472 3481
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.1
Bu, J.2
Zhu, S.3
Chan, S.4
Chen, C.5
-
49
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Y. Yu, K. Li, W. Zhou, and P. Li Trust mechanisms in wireless sensor networks: attack analysis and countermeasures J. Network Comput. Appl. 35 3 2012 867 880
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
50
-
-
84885310593
-
Tc-bac: A trust and centrality degree based access control model in wireless sensor networks
-
J. Duan, D. Gao, C. Foh, and H. Zhang Tc-bac: A trust and centrality degree based access control model in wireless sensor networks Ad Hoc Networks 11 8 2013 2675 2692
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2675-2692
-
-
Duan, J.1
Gao, D.2
Foh, C.3
Zhang, H.4
-
51
-
-
33745201299
-
-
Shamus Software Ltd.
-
Miracl library, Shamus Software Ltd. < http://www.shamus.ie/index.php? page=home >.
-
Miracl Library
-
-
-
52
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 39
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 1-39
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
53
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
ACM New York, NY, USA
-
R. Shay, S. Komanduri, and P.G. Kelley Encountering stronger password requirements: user attitudes and behaviors Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS 2010) 2010 ACM New York, NY, USA 1 10
-
(2010)
Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS 2010)
, pp. 1-10
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
-
55
-
-
79956133331
-
An efficient anonymous authentication protocol for mobile pay-tv
-
T.H. Chen, Y.C. Chen, W.K. Shih, and H.W. Wei An efficient anonymous authentication protocol for mobile pay-tv J. Network Comput. Appl. 34 4 2011 1131 1137
-
(2011)
J. Network Comput. Appl.
, vol.34
, Issue.4
, pp. 1131-1137
-
-
Chen, T.H.1
Chen, Y.C.2
Shih, W.K.3
Wei, H.W.4
-
56
-
-
84855196010
-
Note on design of improved password authentication and update scheme based on elliptic curve cryptography
-
D. He, S. Wu, and J. Chen Note on design of improved password authentication and update scheme based on elliptic curve cryptography Math. Comput. Model. 55 3 2012 1661 1664
-
(2012)
Math. Comput. Model.
, vol.55
, Issue.3
, pp. 1661-1664
-
-
He, D.1
Wu, S.2
Chen, J.3
-
58
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wireless Commun. 8 3 2009 1086 1090
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
59
-
-
85014332650
-
Security in embedded systems: Design challenges
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady Security in embedded systems: design challenges ACM Trans. Embed. Comput. Syst. 3 3 2004 461 491
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
, pp. 461-491
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
60
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs
-
C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs Sensors 13 8 2013 9589 9603
-
(2013)
Sensors
, vol.13
, Issue.8
, pp. 9589-9603
-
-
Li, C.-T.1
Weng, C.-Y.2
Lee, C.-C.3
-
61
-
-
84885231928
-
A strong authentication scheme with user privacy for wireless sensor networks
-
P. Kumar, A. Gurtov, M. Ylianttila, S.-G. Lee, and H. Lee A strong authentication scheme with user privacy for wireless sensor networks ETRI J. 35 5 2013 889 899
-
(2013)
ETRI J.
, vol.35
, Issue.5
, pp. 889-899
-
-
Kumar, P.1
Gurtov, A.2
Ylianttila, M.3
Lee, S.-G.4
Lee, H.5
-
62
-
-
84887815438
-
Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC
-
D. Wang, and C.G. Ma Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC Inform. Fusion 14 4 2013 498 503
-
(2013)
Inform. Fusion
, vol.14
, Issue.4
, pp. 498-503
-
-
Wang, D.1
Ma, C.G.2
-
63
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
10.1002/dac.2468
-
C.G. Ma, D. Wang, and S.D. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 2012 10.1002/dac.2468
-
(2012)
Int. J. Commun. Syst.
-
-
Ma, C.G.1
Wang, D.2
Zhao, S.D.3
-
64
-
-
84868139535
-
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
-
D. Wang, and C. Ma Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards Elsevier J. China Univ. Posts Telecommun. 19 5 2012 104 114
-
(2012)
Elsevier J. China Univ. Posts Telecommun.
, vol.19
, Issue.5
, pp. 104-114
-
-
Wang, D.1
Ma, C.2
-
65
-
-
84871579251
-
Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
-
L. Xu, E. Bertino, Y. Mu, LNCS Springer Berlin/Heidelberg
-
D. Wang, C.G. Ma, S. Zhao, and C. Zhou Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture L. Xu, E. Bertino, Y. Mu, Proceedings of the 6th International Conference on Network and System Security (NSS 2012) LNCS vol. 7645 2012 Springer Berlin/Heidelberg 462 475
-
(2012)
Proceedings of the 6th International Conference on Network and System Security (NSS 2012)
, vol.7645
, pp. 462-475
-
-
Wang, D.1
Ma, C.G.2
Zhao, S.3
Zhou, C.4
-
66
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'
-
M.K. Khan, S. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme' Comput. Commun. 34 3 2011 305 309
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.2
Alghathbar, K.3
-
67
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
S. Sood, A. Sarje, and K. Singh A secure dynamic identity based authentication protocol for multi-server architecture J. Network Comput. Appl. 34 2 2011 609 618
-
(2011)
J. Network Comput. Appl.
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.1
Sarje, A.2
Singh, K.3
-
68
-
-
84856217617
-
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Network Comput. Appl. 35 2 2012 763 769
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
69
-
-
84867864948
-
An authentication scheme to healthcare security under wireless sensor networks
-
T.-C. Hsiao, Y.-T. Liao, J.-Y. Huang, T.-S. Chen, and G.-B. Horng An authentication scheme to healthcare security under wireless sensor networks J. Med. Syst. 36 6 2012 3649 3664
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3649-3664
-
-
Hsiao, T.-C.1
Liao, Y.-T.2
Huang, J.-Y.3
Chen, T.-S.4
Horng, G.-B.5
-
70
-
-
84871820716
-
Cryptanalysis of a dynamic id-based remote user authentication scheme with access control for multi-server environments
-
D.B. He, and H. Hu Cryptanalysis of a dynamic id-based remote user authentication scheme with access control for multi-server environments IEICE Trans. Inform. Syst. 96 1 2013 138 140
-
(2013)
IEICE Trans. Inform. Syst.
, vol.96
, Issue.1
, pp. 138-140
-
-
He, D.B.1
Hu, H.2
-
71
-
-
84868014129
-
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
-
M.K. Khan, and D.B. He A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography Secur. Commun. Networks 5 11 2012 1260 1266
-
(2012)
Secur. Commun. Networks
, vol.5
, Issue.11
, pp. 1260-1266
-
-
Khan, M.K.1
He, D.B.2
-
72
-
-
84901234489
-
An enhanced two-factor user authentication in wireless sensor networks
-
10.1007/s11235-013-9755-5
-
J.-J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 2013 10.1007/s11235-013-9755-5
-
(2013)
Telecommun. Syst.
-
-
Yuan, J.-J.1
-
73
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
IEEE
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz Energy analysis of public-key cryptography for wireless sensor networks Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005) 2005 IEEE 324 328
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005)
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
76
-
-
84859767453
-
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
-
D.B. He An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings Ad Hoc Networks 10 6 2012 1009 1016
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 1009-1016
-
-
He, D.B.1
-
78
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I.-E. Liao, C.-C. Lee, and M.-S. Hwang A password authentication scheme over insecure networks J. Comput. Syst. Sci. 72 4 2006 727 740
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
79
-
-
84879297926
-
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
M. Turkanovic, and M. Holbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electr. Eng. 19 6 2013 109 116
-
(2013)
Electron. Electr. Eng.
, vol.19
, Issue.6
, pp. 109-116
-
-
Turkanovic, M.1
Holbl, M.2
-
80
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
10.1016/j.jnca.2013.02.034
-
X. Li, J. Niu, M.K. Khan, and J. Liao An enhanced smart card based remote user password authentication scheme J. Network Comput. Appl. 2013 10.1016/j.jnca.2013.02.034
-
(2013)
J. Network Comput. Appl.
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
82
-
-
84901208308
-
Robust Smart Card based Password Authentication Scheme Against Smart Card Security Breach
-
ePrint Archive, Report 2012/439
-
D. Wang, C.G. Ma, P. Wang and Z. Chen, Robust Smart Card based Password Authentication Scheme Against Smart Card Security Breach, Cryptology ePrint Archive, Report 2012/439, 2012. < http://eprint.iacr.org/2012/439.pdf >.
-
(2012)
Cryptology
-
-
Wang, D.1
Ma, C.G.2
Wang, P.3
Chen, Z.4
-
84
-
-
84901238755
-
-
Tech. Rep., National Institute of Standards and Technology, Gaithersburg, MD, December
-
W. Burr, D. Dodson, R. Perlner, W. Polk, S. Gupta, E. Nabbus, NIST 800-63-1: NIST Special Publication 800-63-1 Electronic Authentication Guideline, Tech. Rep., National Institute of Standards and Technology, Gaithersburg, MD, December 2011.
-
(2011)
NIST 800-63-1: NIST Special Publication 800-63-1 Electronic Authentication Guideline
-
-
Burr, W.1
Dodson, D.2
Perlner, R.3
Polk, W.4
Gupta, S.5
Nabbus, E.6
-
85
-
-
84863056589
-
Robust smart-cards-based user authentication scheme with user anonymity
-
S.H. Wu, Y.F. Zhu, and Q. Pu Robust smart-cards-based user authentication scheme with user anonymity Secur. Commun. Networks 5 2 2012 236 248
-
(2012)
Secur. Commun. Networks
, vol.5
, Issue.2
, pp. 236-248
-
-
Wu, S.H.1
Zhu, Y.F.2
Pu, Q.3
-
86
-
-
84945119254
-
Entity authentication and key distribution
-
D. Stinson, LNCS Springer Berlin/Heidelberg
-
M. Bellare, and P. Rogaway Entity authentication and key distribution D. Stinson, Advances in Cryptology - CRYPTO'93 LNCS vol. 773 1994 Springer Berlin/Heidelberg 232 249
-
(1994)
Advances in Cryptology - CRYPTO'93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
87
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley, and P. Van Oorschot A research agenda acknowledging the persistence of passwords IEEE Secur. Privacy 10 1 2012 28 36
-
(2012)
IEEE Secur. Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
|