-
1
-
-
69949134676
-
Authenticated reliable and semi-reliable communication in wireless sensor networks
-
Dressler, F. Authenticated reliable and semi-reliable communication in wireless sensor networks. Int. J. Netw. Secur. 2008, 7, 61-68.
-
(2008)
Int. J. Netw. Secur.
, vol.7
, pp. 61-68
-
-
Dressler, F.1
-
2
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh, H.L.; Chen, T.H.; Liu, P.C.; Kim, T.H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767-4779.
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
3
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
2013
-
Shi, W.; Gong, P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 2013, 2013, 730831.
-
(2013)
Int. J. Distrib. Sens. Netw.
, pp. 730831
-
-
Shi, W.1
Gong, P.2
-
5
-
-
14844304757
-
TinyPK: Securing Sensor Networks with Public Key Technology
-
In, ACM Press: Washington, DC, USA
-
Watro, R.; Kong, D.; Cuti, S.F.; Gardiner, C.; Lynn, C.; Kruus, P. TinyPK: Securing Sensor Networks with Public Key Technology. In ACM Workshop on Security of Ad Hoc and Sensor Networks; ACM Press: Washington, DC, USA, 2004; pp. 59-64.
-
(2004)
ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
6
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
In, Taichung, Taiwan, 5-7 June
-
Wong, K.H.; Zheng, Y.; Cao, J.; Wang, S. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 5-7 June 2006; pp. 1-9.
-
(2006)
Proceedings of 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 1-9
-
-
Wong, K.H.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
7
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
In, Washington, DC, USA, 26-30 November
-
Tseng, H.R.; Jan, R.H.; Yang, W. An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '07), Washington, DC, USA, 26-30 November 2007; pp. 986-990.
-
(2007)
Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '07)
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
8
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
9
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 2010, 10, 361-371.
-
(2010)
Ad Hoc Sens. Wirel. Netw.
, vol.10
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
10
-
-
77955495427
-
Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks"
-
Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks". Sensors 2010, 10, 2450-2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
11
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen, T.H.; Shih, W.K. A robust mutual authentication protocol for wireless sensor networks. ETRI J. 2010, 32, 704-712.
-
(2010)
ETRI J.
, vol.32
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
13
-
-
84939573910
-
Differential power analysis
-
In, Santa Barbara, CA, USA, 15-19 August
-
Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, USA, 15-19 August 1999; pp. 388-397.
-
(1999)
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
14
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541-552
-
(2002)
IEEE Trans. Comput.
, vol.51
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
15
-
-
84902241575
-
A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing
-
Muthukuru, J.; Sathyanarayana, B. A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing. Glob. J. Comput. Sci. Technol. 2012, 12, 7-12.
-
(2012)
Glob. J. Comput. Sci. Technol.
, vol.12
, pp. 7-12
-
-
Muthukuru, J.1
Sathyanarayana, B.2
-
16
-
-
84900610179
-
An efficient password security of multiparty key exchange protocol based on ECDLP
-
In, Chengdu, China, 16-18 April
-
Kar, J.; Majhi, B. An efficient password security of multiparty key exchange protocol based on ECDLP. In Proceedings of 2010 2nd International Conference on Computer Engineering and Technology (ICCET), Chengdu, China, 16-18 April 2010; pp. 405-413.
-
(2010)
Proceedings of 2010 2nd International Conference on Computer Engineering and Technology (ICCET)
, pp. 405-413
-
-
Kar, J.1
Majhi, B.2
-
17
-
-
33744525893
-
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
-
Venkata, C.; Saikat, C.; Mukesh, S. A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC. J. Parall. Distrib. Comput. 2006, 66, 959-970.
-
(2006)
J. Parall. Distrib. Comput.
, vol.66
, pp. 959-970
-
-
Venkata, C.1
Saikat, C.2
Mukesh, S.3
-
18
-
-
70349791260
-
A simple user authentication scheme for grid computing
-
Lu, R.; Cao, Z.; Chai, Z.; Liang, X. A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 2008, 7, 202-206.
-
(2008)
Int. J. Netw. Secur.
, vol.7
, pp. 202-206
-
-
Lu, R.1
Cao, Z.2
Chai, Z.3
Liang, X.4
-
19
-
-
63649090970
-
An off-line dictionary attack on a simple three-party key exchange protocol
-
Nam, J.; Paik, J.; Kang, H.K.; Kim, U.M.; Won, D. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 2009, 13, 205-207.
-
(2009)
IEEE Commun. Lett.
, vol.13
, pp. 205-207
-
-
Nam, J.1
Paik, J.2
Kang, H.K.3
Kim, U.M.4
Won, D.5
-
20
-
-
72449211714
-
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
-
Lee, Y.; Kim, S.; Won, D. Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 2010, 36, 213-223.
-
(2010)
Comput. Electr. Eng.
, vol.36
, pp. 213-223
-
-
Lee, Y.1
Kim, S.2
Won, D.3
-
21
-
-
84891596035
-
Dictionary attacks against password-based authenticated three-party key exchange protocols
-
Nam, J.; Choo, K.K.R.; Kim, M.; Paik, J.; Won, D. Dictionary attacks against password-based authenticated three-party key exchange protocols. KSII Trans. Internet Inf. Syst. 2013, 7, 3244-3260.
-
(2013)
KSII Trans. Internet Inf. Syst.
, vol.7
, pp. 3244-3260
-
-
Nam, J.1
Choo, K.K.R.2
Kim, M.3
Paik, J.4
Won, D.5
-
22
-
-
84863463143
-
An enhanced secure authentication scheme with anonymity for wireless environments
-
Jeon, W.; Kim, J.; Nam, J.; Lee, Y.; Won, W. An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Trans. Commun. 2012, E95. B, 2505-2508.
-
(2012)
IEICE Trans. Commun.
, vol.E95-B
, pp. 2505-2508
-
-
Jeon, W.1
Kim, J.2
Nam, J.3
Lee, Y.4
Won, W.5
-
23
-
-
77954018125
-
Security analysis of reliable transport layer protocols for wireless sensor networks
-
In, Mannheim, Germany, 29 March-2 April
-
Buttyan, L.; Csik, L. Security analysis of reliable transport layer protocols for wireless sensor networks. In Proceedings of 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Mannheim, Germany, 29 March-2 April 2010; pp. 419-424.
-
(2010)
Proceedings of 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
, pp. 419-424
-
-
Buttyan, L.1
Csik, L.2
-
24
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
In, West Point, NY, USA, 15-17 June
-
Brownfield, M.; Gupta, Y.; Davis, N. Wireless sensor network denial of sleep attack. In Proceedings of 2005 the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05), West Point, NY, USA, 15-17 June 2005; pp. 356-364.
-
(2005)
Proceedings of 2005 the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)
, pp. 356-364
-
-
Brownfield, M.1
Gupta, Y.2
Davis, N.3
-
25
-
-
80053630581
-
Maximum damage battery depletion attack in mobile sensor networks
-
Khouzani, M.H.R.; Sarkar, S. Maximum damage battery depletion attack in mobile sensor networks. IEEE Trans. Autom. Control 2011, 56, 2358-2368.
-
(2011)
IEEE Trans. Autom. Control
, vol.56
, pp. 2358-2368
-
-
Khouzani, M.H.R.1
Sarkar, S.2
-
26
-
-
84867839301
-
Maximum damage malware attack in mobile wireless networks
-
Khouzani, M.H.R.; Sarkar, S.; Altman, E. Maximum damage malware attack in mobile wireless networks. ACM Trans. Netw. 2012, 20, 1347-1360.
-
(2012)
ACM Trans. Netw.
, vol.20
, pp. 1347-1360
-
-
Khouzani, M.H.R.1
Sarkar, S.2
Altman, E.3
-
27
-
-
34347393777
-
Identity-based key agreement protocols from pairings
-
Chen, L.; Cheng, Z.; Smart, N.P. Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 2007, 6, 213-241.
-
(2007)
Int. J. Inf. Secur.
, vol.6
, pp. 213-241
-
-
Chen, L.1
Cheng, Z.2
Smart, N.P.3
-
28
-
-
69549116775
-
Identity-based anonymous remote authentication for value-added services in mobile networks
-
Cao, X.; Zeng, X.; Kou, W.; Hu, L. Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 2009, 58, 3508-3517.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, pp. 3508-3517
-
-
Cao, X.1
Zeng, X.2
Kou, W.3
Hu, L.4
-
29
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
He, D.; Chen, J.; Hu, J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 2012, 13, 223-230.
-
(2012)
Inf. Fusion
, vol.13
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
30
-
-
77957997482
-
Weaknesses and improvement of secure hash-based strong-password authentication protocol
-
Jeong, H.; Won, D.; Kim, S. Weaknesses and improvement of secure hash-based strong-password authentication protocol. J. Inf. Sci. Eng. 2010, 26, 1845-1858.
-
(2010)
J. Inf. Sci. Eng.
, vol.26
, pp. 1845-1858
-
-
Jeong, H.1
Won, D.2
Kim, S.3
-
31
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
Lee, C.C.; Hwang, M.S.; Liao, I.E. Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 2006, 53, 1683-1687.
-
(2006)
IEEE Trans. Ind. Electron.
, vol.53
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
32
-
-
33846446132
-
Security analysis of a nonce-based user authentication scheme using smart cards
-
Nam, J.; Kim, S.; Park, S.; Won, D. Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2007, E90-A, 299-302.
-
(2007)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.E90-A
, pp. 299-302
-
-
Nam, J.1
Kim, S.2
Park, S.3
Won, D.4
-
33
-
-
85063335766
-
Nonmonotonic cryptographic protocols
-
In, Franconia, NH, USA, 14-16 June
-
Rubin, A.D.; Honeyman, P. Nonmonotonic cryptographic protocols. In Proceedings of the Computer Security Foundations Workshop VII, 1994 (CSFW 7), Franconia, NH, USA, 14-16 June 1994; pp. 100-116.
-
(1994)
Proceedings of the Computer Security Foundations Workshop VII, 1994 (CSFW 7)
, pp. 100-116
-
-
Rubin, A.D.1
Honeyman, P.2
-
34
-
-
44049103828
-
Towards a formal verification of an authentication protocol using non-monotonic logic
-
In, Las Vegas, NV, USA, 7-9 April
-
Das, M.L.; Narasimhan, V.L. Towards a formal verification of an authentication protocol using non-monotonic logic. In Proceedings of the IEEE Fifth International Conference on Information Technology: New Generations, Las Vegas, NV, USA, 7-9 April 2008; pp. 545-550.
-
(2008)
Proceedings of the IEEE Fifth International Conference on Information Technology: New Generations
, pp. 545-550
-
-
Das, M.L.1
Narasimhan, V.L.2
-
35
-
-
58049120659
-
Analysis of authentication protocols based on Rubin logic
-
In, Dalian, China, 12-14 October
-
Xu, Y.; Xie, X. Analysis of authentication protocols based on Rubin logic. In Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 12-14 October 2008; pp. 1-5.
-
(2008)
Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1-5
-
-
Xu, Y.1
Xie, X.2
-
36
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
doi:10.1002/sec.517
-
Vaidya, B.; Makrakis, D.; Mouftah, H. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2012, doi:10.1002/sec.517.
-
(2012)
Secur. Commun. Netw.
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
|