-
1
-
-
2942686425
-
Sensor networks: Evolution, opportunities and challenges
-
10.1109/JPROC.2003.814918
-
Chong, C. Y.; Kumar, S. (2003). Sensor networks: evolution, opportunities and challenges. Proceedings of the IEEE, 91(8), 1247-1256.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
2
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
10.1109/TWC.2008.080128
-
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
3
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Rome, Italy
-
Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D.; Tygar, J. D. (2001). SPINS: security protocols for sensor networks. In Proceedings of ACM MobiCom'01, Rome, Italy (pp. 189-199).
-
(2001)
Proceedings of ACM MobiCom'01
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
5
-
-
78650508247
-
Model checking wireless sensor network security protocols: TinySec plus LEAP plus TinyPK
-
10.1007/s11235-008-9131-z
-
Tobarra, L.; Cazorla, D.; Cuartero, F. (2009). Model checking wireless sensor network security protocols: TinySec plus LEAP plus TinyPK. Telecommunications Systems, 40(3-4), 91-99.
-
(2009)
Telecommunications Systems
, vol.40
, Issue.3-4
, pp. 91-99
-
-
Tobarra, L.1
Cazorla, D.2
Cuartero, F.3
-
6
-
-
84919453382
-
User authentication in sensor networks
-
Ulm, Germany
-
Benenson, Z.; Felix, C. G.; Dogan, K. (2004). User authentication in sensor networks. In Proceedings of workshop sensor networks, Ulm, Germany (pp. 385-389).
-
(2004)
Proceedings of Workshop Sensor Networks
, pp. 385-389
-
-
Benenson, Z.1
Felix, C.G.2
Dogan, K.3
-
8
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
Binod, V.; Jorge, S. S.; Joel, J. P. C. R. (2010). User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems, 23(9), 1201-1222.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.9
, pp. 1201-1222
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.C.R.3
-
9
-
-
14844304757
-
Securing sensor networks with public key technology
-
Washington, DC, USA 10.1145/1029102.1029113
-
Watro, R.; Derrick, K.; Sue-fen, C.; Charles, G.; Charles, L.; Peter, K.; Tiny, P.K. (2004). Securing sensor networks with public key technology. In Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, Washington, DC, USA (pp. 59-64).
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Derrick, K.2
Sue-Fen, C.3
Charles, G.4
Charles, L.5
Peter, K.6
Tiny, P.K.7
-
10
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan
-
Wong, K. H. M.; Yuan, Z.; Jiannong, C.; Shengwei, W. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceedings of sensor networks, ubiquitous, and trustworthy computing, Taichung, Taiwan (pp. 244-251).
-
(2006)
Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.M.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
11
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Washington, DC, USA
-
Tseng, H. R.; Jan, R. H.; Yang, W. (2007). An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE Globecom, Washington, DC, USA (pp. 986-990).
-
(2007)
Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
13
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
Reykjavik, Iceland
-
Ko, L. C. (2008). A novel dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE ISWCS, Reykjavik, Iceland (pp. 608-612).
-
(2008)
Proceedings of IEEE ISWCS
, pp. 608-612
-
-
Ko, L.C.1
-
14
-
-
74049156258
-
Robust dynamic user authentication scheme for wireless sensor networks
-
Canary Islands, Spain
-
Binod, V.; Jorge, S. S.; Joel, J. P. C. R. (2009). Robust dynamic user authentication scheme for wireless sensor networks. In Proceedings of ACM Q2SWinet, Canary Islands, Spain (pp. 88-91).
-
(2009)
Proceedings of ACM Q2SWinet
, pp. 88-91
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.C.R.3
-
15
-
-
84862773089
-
Improvement of Das's two-factor authentication protocol in wireless sensor networks
-
ePrint archive Accessed 28 February 2010
-
Nyang, D. H.; Lee, M. K. (2009). Improvement of Das's two-factor authentication protocol in wireless sensor networks. Cryptology, ePrint archive. http://eprint.iacr.org/2009/631.pdf. Accessed 28 February 2010.
-
(2009)
Cryptology
-
-
Nyang D., .H.1
Lee M., .K.2
-
16
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
10.3390/s100302450
-
Khan, M. K.; Alghathbar, K. (2010). Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors, 10(3), 2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
17
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA
-
Kocher, P.; Jaffe, J.; Jun, B. (1999). Differential power analysis. In Proceedings of 19th international advances in cryptology conference (CRYPTO), Santa Barbara, CA, USA (pp. 388-397).
-
(1999)
Proceedings of 19th International Advances in Cryptology Conference (CRYPTO)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
0036566408
-
Examining smartcard security under the threat of power analysis attacks
-
10.1109/TC.2002.1004593
-
Messerges, T. S.; Dabbish, E. A.; Sloan, R. H. (2002). Examining smartcard security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
19
-
-
33751167604
-
Improving the security of 'a flexible biometrics remote user authentication scheme'
-
10.1016/j.csi.2006.01.002
-
Khan, M. K.; Zhang, J. (2007). Improving the security of 'a flexible biometrics remote user authentication scheme'. Computer Standards & Interfaces, 29(1), 82-85.
-
(2007)
Computer Standards & Interfaces
, vol.29
, Issue.1
, pp. 82-85
-
-
Khan, M.K.1
Zhang, J.2
-
20
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
10.1016/j.chaos.2006.05.061
-
Khan, M. K.; Zhang, J.; Wang, X. (2008). Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons and Fractals, 35(3), 519-524.
-
(2008)
Chaos, Solitons and Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
21
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
10.1016/j.jnca.2009.08.001
-
Li, C. T.; Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
22
-
-
0037030525
-
Fingerprint-based remote user authentication scheme using smart cards
-
10.1049/el:20020380
-
Lee, J. K.; Ryu, S. R.; Yoo, K. Y. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38(12), 554-555.
-
(2002)
Electronics Letters
, vol.38
, Issue.12
, pp. 554-555
-
-
Lee, J.K.1
Ryu, S.R.2
Yoo, K.Y.3
-
23
-
-
79958119500
-
Privacy-preserving and tokenless chaotic revocable face authentication scheme
-
10.1007/s11235-010-9314-2
-
Khan, M. K.; Alghathbar, K.; Zhang, J. (2011). Privacy-preserving and tokenless chaotic revocable face authentication scheme. Telecommunications Systems, 47(3-4), 227-234.
-
(2011)
Telecommunications Systems
, vol.47
, Issue.3-4
, pp. 227-234
-
-
Khan, M.K.1
Alghathbar, K.2
Zhang, J.3
-
24
-
-
79958162287
-
Biometric bits extraction through phase quantization based on feature level fusion
-
10.1007/s11235-010-9317-z
-
Lee, H.; Teoh, A. B. J.; Kim, J. (2011). Biometric bits extraction through phase quantization based on feature level fusion. Telecommunications Systems, 47(3-4), 255-273.
-
(2011)
Telecommunications Systems
, vol.47
, Issue.3-4
, pp. 255-273
-
-
Lee, H.1
Teoh, A.B.J.2
Kim, J.3
-
26
-
-
0025386404
-
A logic of authentication
-
10.1145/77648.77649
-
Burrows, M.; Abadi, M.; Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 1-13.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
27
-
-
0025405980
-
A critique of the Burrows, Abadi, and Needham logic
-
10.1145/382258.382789
-
Nessett, D. M. (1990). A critique of the Burrows, Abadi, and Needham logic. Operating Systems Review, 24(2), 35-38.
-
(1990)
Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
|