-
1
-
-
34547484870
-
The tenet architecture for tiered sensor networks
-
DOI 10.1145/1182807.1182823, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
-
O. Gnawali, K.-Y. Jang, J. Paek, M. Vieira, R. Govindan, B. Greenstein, A. Joki, D. Estrin, and E. Kohler The tenet architecture for tiered sensor networks Proc. SenSys 2006 2006 ACM 153 166 (Pubitemid 47168684)
-
(2006)
SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
, pp. 153-166
-
-
Gnawali, O.1
Jang, K.-Y.2
Paek, J.3
Vieira, M.4
Govindan, R.5
Greenstein, B.6
Joki, A.7
Estrin, D.8
Kohler, E.9
-
2
-
-
70349690087
-
Secure range queries in tiered sensor networks
-
IEEE
-
J. Shi, R. Zhang, and Y. Zhang Secure range queries in tiered sensor networks Proc. INFOCOM 2009 2009 IEEE 945 953
-
(2009)
Proc. INFOCOM 2009
, pp. 945-953
-
-
Shi, J.1
Zhang, R.2
Zhang, Y.3
-
3
-
-
84863455619
-
Two-tiered constrained relay node placement in wireless sensor networks: Computational complexity and efficient approximations
-
D. Yang, S. Misra, X. Fang, G. Xue, and J. Zhang Two-tiered constrained relay node placement in wireless sensor networks: computational complexity and efficient approximations IEEE Trans. Mobile Comput. 11 8 2012 1399 1411
-
(2012)
IEEE Trans. Mobile Comput.
, vol.11
, Issue.8
, pp. 1399-1411
-
-
Yang, D.1
Misra, S.2
Fang, X.3
Xue, G.4
Zhang, J.5
-
5
-
-
80855130876
-
Distributed access control with privacy support in wireless sensor networks
-
D. He, J. Bu, S. Zhu, S. Chan, and C. Chen Distributed access control with privacy support in wireless sensor networks IEEE Trans. Wireless Commun. 10 10 2011 3472 3481
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3472-3481
-
-
He, D.1
Bu, J.2
Zhu, S.3
Chan, S.4
Chen, C.5
-
6
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
G.M. Yang, D.S. Wong, H.X. Wang, and X.T. Deng Two-factor mutual authentication based on smart cards and passwords J. Comput. Syst. Sci. 74 7 2008 1160 1172
-
(2008)
J. Comput. Syst. Sci.
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.M.1
Wong, D.S.2
Wang, H.X.3
Deng, X.T.4
-
7
-
-
84901199502
-
Offline dictionary attack on password authentication schemes using smart cards
-
Y. Desmedt, B. Thuraisingham, K. Hamlen, Springer-Verlag < >
-
D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, Proc. ISC 2013, LNCS 2014 Springer-Verlag 1 16, < http://eprint.iacr.org/2014/208.pdf >
-
(2014)
Proc. ISC 2013, LNCS
, pp. 1-16
-
-
Wang, D.1
Wang, P.2
-
8
-
-
77955217681
-
Chip and PIN is broken
-
S.J. Murdoch, S. Drimer, R. Anderson, M. Bond, Chip and PIN is broken, in: Proc. IEEE Security&Privacy 2010, IEEE Computer Society, 2010, pp. 433-446.
-
(2010)
Proc. IEEE Security&Privacy 2010, IEEE Computer Society
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
9
-
-
84871983346
-
Security implications in kerberos by the introduction of smart cards
-
ACM New York, NY, USA
-
N. Mavrogiannopoulos, A. Pashalidis, and B. Preneel Security implications in kerberos by the introduction of smart cards Proc. ACM ASIACCS 2012 2012 ACM New York, NY, USA 59 63
-
(2012)
Proc. ACM ASIACCS 2012
, pp. 59-63
-
-
Mavrogiannopoulos, N.1
Pashalidis, A.2
Preneel, B.3
-
11
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wireless Commun. 8 3 2009 1086 1090
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
14
-
-
84873449020
-
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
-
ACM
-
B. Liu, Y. Jiang, F. Sha, and R. Govindan Cloud-enabled privacy-preserving collaborative learning for mobile sensing Proc. Sensys 2012 2012 ACM 57 70
-
(2012)
Proc. Sensys 2012
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
15
-
-
84865738924
-
Understanding identity exposure in pervasive computing environments
-
F. Zhu, S. Carpenter, and A. Kulkarni Understanding identity exposure in pervasive computing environments Pervasive Mobile Comput. 8 5 2012 777 794
-
(2012)
Pervasive Mobile Comput.
, vol.8
, Issue.5
, pp. 777-794
-
-
Zhu, F.1
Carpenter, S.2
Kulkarni, A.3
-
16
-
-
33748125161
-
A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
-
DOI 10.1016/j.cose.2006.05.002, PII S0167404806000769
-
K. Mangipudi, and R. Katti A secure identification and key agreement protocol with user anonymity (SIKA) Comput. Secur. 25 6 2006 420 425 (Pubitemid 44307349)
-
(2006)
Computers and Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.1
Katti, R.2
-
17
-
-
78751651500
-
Sat: A security architecture achieving anonymity and traceability in wireless mesh networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang Sat: a security architecture achieving anonymity and traceability in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 8 2 2011 295 307
-
(2011)
IEEE Trans. Depend. Secur. Comput.
, vol.8
, Issue.2
, pp. 295-307
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
18
-
-
84906756164
-
Cpal: A conditional privacy-preserving authentication with access linkability for roaming service
-
C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen Cpal: a conditional privacy-preserving authentication with access linkability for roaming service IEEE Internet Things J. 2014 http://dx.doi.org/10.1109/JIOT.2014.2306673
-
(2014)
IEEE Internet Things J.
-
-
Lai, C.1
Li, H.2
Liang, X.3
Lu, R.4
Zhang, K.5
Shen, X.6
-
19
-
-
0344875575
-
Anonymity and privacy: A modular approach
-
D. Hughes, V. Shmatikov, and Information hiding anonymity and privacy: a modular approach J. Comput. Secur. 12 1 2004 3 36
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
Hiding, I.3
-
20
-
-
75449106985
-
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
-
X. Li, W. Qiu, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 57 2 2010 793 800
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.2
, pp. 793-800
-
-
Li, X.1
Qiu, W.2
Chen, K.3
Li, J.4
-
21
-
-
84887815438
-
Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC
-
D. Wang, and C. Ma Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC Inform. Fusion 14 4 2013 498 503
-
(2013)
Inform. Fusion
, vol.14
, Issue.4
, pp. 498-503
-
-
Wang, D.1
Ma, C.2
-
22
-
-
84884990326
-
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
-
K. Xue, P. Hong, and C. Ma A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture J. Comput. Syst. Sci. 80 1 2014 195 206
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.1
, pp. 195-206
-
-
Xue, K.1
Hong, P.2
Ma, C.3
-
23
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Netw. 10 4 2010 361 371
-
(2010)
Ad Hoc Sensor Wireless Netw.
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
24
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
M. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 3 2010 2450 2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.1
Alghathbar, K.2
-
25
-
-
79957718973
-
Ruasn: A robust user authentication framework for wireless sensor networks
-
P. Kumar, A.J. Choudhury, M. Sain, S.M. Lee, and H.J. Lee Ruasn: a robust user authentication framework for wireless sensor networks Sensors 11 5 2011 5020 5046
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 5020-5046
-
-
Kumar, P.1
Choudhury, A.J.2
Sain, M.3
Lee, S.M.4
Lee, H.J.5
-
26
-
-
84872473654
-
Security enhancement of robust user authentication framework for wireless sensor networks
-
Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
-
(2012)
China Commun.
, vol.9
, Issue.10
, pp. 103-111
-
-
Jiang, Q.1
Ma, Z.2
Ma, J.F.3
Li, G.4
-
27
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Network Comput. Appl. 36 1 2013 316 323
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
28
-
-
84887125774
-
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
-
C. Lai, H. Li, R. Lu, and X.S. Shen SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks Comput. Networks 57 17 2013 3492 3510
-
(2013)
Comput. Networks
, vol.57
, Issue.17
, pp. 3492-3510
-
-
Lai, C.1
Li, H.2
Lu, R.3
Shen, X.S.4
-
29
-
-
84862773089
-
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks
-
D. Nyang, M. Lee, Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks, Cryptology ePrint Archive, Report 2009/631, 2009. < http://eprint.iacr.org/2009/631.pdf >.
-
(2009)
Cryptology EPrint Archive, Report 2009/631
-
-
Nyang, D.1
Lee, M.2
-
30
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T. Chen, and W. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 32 5 2010 704 712
-
(2010)
ETRI J.
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.1
Shih, W.2
-
31
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
H. Yeh, T. Chen, P. Liu, T. Kim, and H. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.1
Chen, T.2
Liu, P.3
Kim, T.4
Wei, H.5
-
32
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
D. Sun, J. Li, Z. Feng, Z. Cao, and G. Xu On the security and improvement of a two-factor user authentication scheme in wireless sensor networks Pers. Ubiquitous Comput. 17 5 2013 895 905
-
(2013)
Pers. Ubiquitous Comput.
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D.1
Li, J.2
Feng, Z.3
Cao, Z.4
Xu, G.5
-
33
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
A.K. Das, P. Sharma, S. Chatterjee, and J.K. Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Network Comput. Appl. 35 52 2012 1646 1656
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.52
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
34
-
-
84901234489
-
An enhanced two-factor user authentication in wireless sensor networks
-
J.-J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 55 1 2014 105 113
-
(2014)
Telecommun. Syst.
, vol.55
, Issue.1
, pp. 105-113
-
-
Yuan, J.-J.1
-
35
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
B. Vaidya, D. Makrakis, and H. Mouftah Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Netw. 2012 http://dx.doi.org/10.1002/sec.517
-
(2012)
Secur. Commun. Netw.
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
36
-
-
79960062320
-
An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
-
R. Fan, D. He, X. Pan, and L. Ping An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks J. Zhejinag Univ.-Sci C 12 7 2011 550 560
-
(2011)
J. Zhejinag Univ.-Sci C
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
He, D.2
Pan, X.3
Ping, L.4
-
37
-
-
84879297926
-
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
M. Turkanovic, and M. Holbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electr. Eng. 19 6 2013 109 116
-
(2013)
Electron. Electr. Eng.
, vol.19
, Issue.6
, pp. 109-116
-
-
Turkanovic, M.1
Holbl, M.2
-
38
-
-
84883237067
-
Towards secure and dynamic password based user authentication scheme in hierarchical wireless sensor networks
-
C.-T. Li, C.-Y. Weng, C.-C. Lee, and C.-W. Lee Towards secure and dynamic password based user authentication scheme in hierarchical wireless sensor networks Int. J. Secur. Appl. 7 3 2013 249 258
-
(2013)
Int. J. Secur. Appl.
, vol.7
, Issue.3
, pp. 249-258
-
-
Li, C.-T.1
Weng, C.-Y.2
Lee, C.-C.3
Lee, C.-W.4
-
39
-
-
79959299654
-
On the (im) possibility of perennial message recognition protocols without public-key cryptography
-
ACM
-
M. González Muñiz, and P. Laud On the (im) possibility of perennial message recognition protocols without public-key cryptography Proc. ACM SAC 2011 2011 ACM 1510 1515
-
(2011)
Proc. ACM SAC 2011
, pp. 1510-1515
-
-
González Muñiz, M.1
Laud, P.2
-
40
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Advances in Cryptology - EUROCRYPT '98
-
D. Simon Finding collisions on a one-way street: can secure hash functions be based on general assumptions? K. Nyberg, Proc. EUROCRYPT 1998, LNCS vol. 1403 1998 Springer Verlag 334 345 (Pubitemid 128081496)
-
(1998)
Lecture Notes In Computer Science
, Issue.1403
, pp. 334-345
-
-
Simon, D.R.1
-
41
-
-
33646036428
-
Limits of the cryptographic realization of dolev-yao-style xor
-
S. Vimercati, P. Syverson, D. Gollmann, Springer Berlin Heidelberg
-
M. Backes, and B. Pfitzmann Limits of the cryptographic realization of dolev-yao-style xor S. Vimercati, P. Syverson, D. Gollmann, Proc. ESORICS 2005, LNCS vol. 3679 2005 Springer Berlin Heidelberg 178 196
-
(2005)
Proc. ESORICS 2005, LNCS
, vol.3679
, pp. 178-196
-
-
Backes, M.1
Pfitzmann, B.2
-
42
-
-
38149038590
-
Does secure time-stamping imply collision-free hash functions?
-
W. Susilo, J. Liu, Y. Mu, Springer Berlin Heidelberg
-
A. Buldas, and A. Jrgenson Does secure time-stamping imply collision-free hash functions? W. Susilo, J. Liu, Y. Mu, Proc. ProvSec 2007, LNCS vol. 4784 2007 Springer Berlin Heidelberg 138 150
-
(2007)
Proc. ProvSec 2007, LNCS
, vol.4784
, pp. 138-150
-
-
Buldas, A.1
Jrgenson, A.2
-
44
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Secur. 2 3 1999 230 268
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
45
-
-
84957794888
-
Forward secrecy and its application to future mobile communications security
-
H. Imai, Y. Zheng, Springer Berlin/ Heidelberg
-
D. Park, C. Boyd, and S.-J. Moon Forward secrecy and its application to future mobile communications security H. Imai, Y. Zheng, Proc. PKC 2000, LNCS vol. 1751 2000 Springer Berlin/ Heidelberg 433 445
-
(2000)
Proc. PKC 2000, LNCS
, vol.1751
, pp. 433-445
-
-
Park, D.1
Boyd, C.2
Moon, S.-J.3
-
46
-
-
24144502325
-
The relationship between password-authenticated key exchange and other cryptographic primitives
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
M.-H. Nguyen The relationship between password-authenticated key exchange and other cryptographic primitives J. Kilian, Proc. TCC 2006, LNCS vol. 3378 2005 Springer Verlag 457 475 (Pubitemid 41231178)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 457-475
-
-
Nguyen, M.-H.1
-
47
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
P. Zeng, Z. Cao, K.-k. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Commun. Lett. 13 3 2009 170 171
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.-K.3
Wang, S.4
-
48
-
-
1942487780
-
A new authentication scheme with anonymity for wireless environments
-
J. Zhu, and J. Ma A new authentication scheme with anonymity for wireless environments IEEE Trans. Consum. Electron. 50 1 2004 231 235
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.1
, pp. 231-235
-
-
Zhu, J.1
Ma, J.2
-
49
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
DOI 10.1109/TIE.2006.881998
-
C.-C. Lee, M.-S. Hwang, and I.-E. Liao Security enhancement on a new authentication scheme with anonymity for wireless environments IEEE Trans. Ind. Electron. 53 5 2006 1683 1687 (Pubitemid 44593519)
-
(2006)
IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.-C.1
Hwang, M.-S.2
Liao, I.-E.3
-
50
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
C.-C. Wu, W.-B. Lee, and W.-J. Tsaur A secure authentication scheme with anonymity for wireless communications IEEE Commun. Lett. 12 10 2008 722 723
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.-C.1
Lee, W.-B.2
Tsaur, W.-J.3
-
51
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs
-
C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs Sensors 13 8 2013 9589 9603
-
(2013)
Sensors
, vol.13
, Issue.8
, pp. 9589-9603
-
-
Li, C.-T.1
Weng, C.-Y.2
Lee, C.-C.3
-
52
-
-
84863271667
-
E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
P. Kumar, S.-G. Lee, and H.-J. Lee E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 12 2 2012 1625 1647
-
(2012)
Sensors
, vol.12
, Issue.2
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.-G.2
Lee, H.-J.3
-
53
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
54
-
-
68349130174
-
Attacking smart card systems: Theory and practice
-
K. Markantonakis, M. Tunstall, G. Hancke, I. Askoxylakis, and K. Mayes Attacking smart card systems: theory and practice Inform. Secur. Tech. Rep. 14 2 2009 46 56
-
(2009)
Inform. Secur. Tech. Rep.
, vol.14
, Issue.2
, pp. 46-56
-
-
Markantonakis, K.1
Tunstall, M.2
Hancke, G.3
Askoxylakis, I.4
Mayes, K.5
-
55
-
-
84867337073
-
Side channel analysis attacks using am demodulation on commercial smart cards with seed
-
T.H. Kim, C. Kim, and I. Park Side channel analysis attacks using am demodulation on commercial smart cards with seed J. Syst. Soft. 85 12 2012 2899 2908
-
(2012)
J. Syst. Soft.
, vol.85
, Issue.12
, pp. 2899-2908
-
-
Kim, T.H.1
Kim, C.2
Park, I.3
-
57
-
-
84893081352
-
Reverse-engineering a cryptographic rfid tag
-
(USENIX Security 2008), USENIX Association
-
K. Nohl, D. Evans, S. Starbug, H. Plötz, Reverse-engineering a cryptographic rfid tag, in: Proc. 17th USENIX Security Symp. (USENIX Security 2008), USENIX Association, 2008, pp. 185-193.
-
(2008)
Proc. 17th USENIX Security Symp
, pp. 185-193
-
-
Nohl, K.1
-
58
-
-
84894522439
-
Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards
-
J.-S. Leu, and W.-B. Hsieh Efficient and secure dynamic id-based remote user authentication scheme for distributed systems using smart cards IET Inf. Secur. 8 2 2014 104 113
-
(2014)
IET Inf. Secur.
, vol.8
, Issue.2
, pp. 104-113
-
-
Leu, J.-S.1
Hsieh, W.-B.2
-
59
-
-
84881573841
-
An efficient authentication protocol with user anonymity for mobile networks
-
IEEE
-
H. Li, Y. Yang, and L. Pang An efficient authentication protocol with user anonymity for mobile networks Proc. WCNC 2013 2013 IEEE 1842 1847
-
(2013)
Proc. WCNC 2013
, pp. 1842-1847
-
-
Li, H.1
Yang, Y.2
Pang, L.3
-
60
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 2011 367 374
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
61
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
C. Chen, D. He, S. Chan, J. Bu, and R. Fan Lightweight and provably secure user authentication with anonymity for the global mobility network Int. J. Commun. Syst. 24 3 2011 347 362
-
(2011)
Int. J. Commun. Syst.
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Fan, R.5
-
62
-
-
84856217617
-
An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Network Comput. Appl. 35 2 2012 763 769
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
63
-
-
84858082073
-
An improved dynamic id-based remote user authentication with key agreement scheme
-
F. Wen, and X. Li An improved dynamic id-based remote user authentication with key agreement scheme Comput. Electri. Eng. 38 2 2012 381 387
-
(2012)
Comput. Electri. Eng.
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.1
Li, X.2
-
64
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme'
-
M. Khan, and S. Kim Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme' Comput. Commun. 34 3 2011 305 309
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.1
Kim, S.2
-
65
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
M. Turkanović, B. Brumen, and M. Hölbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Networks 20 2014 96 112
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanović, M.1
Brumen, B.2
Hölbl, M.3
-
66
-
-
84911988873
-
An authentication and key agreement protocol for satellite communications
-
C.-C. Chang, T.-F. Cheng, and H.-L. Wu An authentication and key agreement protocol for satellite communications Int. J. Commun. Syst. 2013 http://dx.doi.org/10.1002/dac.2448
-
(2013)
Int. J. Commun. Syst.
-
-
Chang, C.-C.1
Cheng, T.-F.2
Wu, H.-L.3
-
67
-
-
84931577706
-
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
-
S. Shin, H. Yeh, and K. Kim An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks Peer-to-Peer Network Appl. 2013 http://dx.doi.org/10.1007/s12083-013-0218-2
-
(2013)
Peer-to-Peer Network Appl.
-
-
Shin, S.1
Yeh, H.2
Kim, K.3
-
68
-
-
84957019437
-
Privacy Protection for Transactions of Digital Goods
-
Information and Communications Security
-
F. Bao, and R. Deng Privacy protection for transactions of digital goods S. Qing, T. Okamoto, J. Zhou, Proc. ICICS 2001, LNCS vol. 2229 2001 Springer-Verlag 202 213 (Pubitemid 33361969)
-
(2001)
Lecture Notes In Computer Science
, Issue.2229
, pp. 202-213
-
-
Bao, F.1
Deng, R.2
-
70
-
-
54449094667
-
A secure dynamic id based remote user authentication scheme for multi-server environment
-
Y.-P. Liao, and S.-S. Wang A secure dynamic id based remote user authentication scheme for multi-server environment Comput. Stand. & Inter. 31 1 2009 24 29
-
(2009)
Comput. Stand. & Inter.
, vol.31
, Issue.1
, pp. 24-29
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
71
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
D. Wang, and P. Wang Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks Ad Hoc Networks 20 2014 1 15
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
72
-
-
84863921959
-
Password protected smart card and memory stick authentication against off-line dictionary attacks
-
Springer Boston
-
Y.G. Wang Password protected smart card and memory stick authentication against off-line dictionary attacks Proc. SEC 2012, IFIP AICT vol. 376 2012 Springer Boston 489 500
-
(2012)
Proc. SEC 2012, IFIP AICT
, vol.376
, pp. 489-500
-
-
Wang, Y.G.1
-
73
-
-
77951127884
-
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
-
S. Zhong, and F. Wu A collusion-resistant routing scheme for noncooperative wireless ad hoc networks IEEE/ACM Trans. Network 18 2 2010 582 595
-
(2010)
IEEE/ACM Trans. Network
, vol.18
, Issue.2
, pp. 582-595
-
-
Zhong, S.1
Wu, F.2
-
74
-
-
84876041353
-
Robust localization against outliers in wireless sensor networks
-
Q. Xiao, K. Bu, Z. Wang, and B. Xiao Robust localization against outliers in wireless sensor networks ACM Trans. Sensor Network 9 2 2013 24
-
(2013)
ACM Trans. Sensor Network
, vol.9
, Issue.2
, pp. 24
-
-
Xiao, Q.1
Bu, K.2
Wang, Z.3
Xiao, B.4
-
75
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
77
-
-
77955315492
-
Whats in a name?
-
R. Sion, Springer
-
J. Bonneau, M. Just, and G. Matthews Whats in a name? R. Sion, Proc. FC 2010, LNCS vol. 6052 2010 Springer 98 113
-
(2010)
Proc. FC 2010, LNCS
, vol.6052
, pp. 98-113
-
-
Bonneau, J.1
Just, M.2
Matthews, G.3
-
78
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
J. Bonneau, The science of guessing: analyzing an anonymized corpus of 70 million passwords, in: Proc. IEEE S&P 2012, IEEE Computer Society, 2012, pp. 538-552.
-
(2012)
Proc. IEEE S&P 2012, IEEE Computer Society
, pp. 538-552
-
-
Bonneau, J.1
-
79
-
-
77953306210
-
Password strength: An empirical analysis
-
M. Dell'Amico, P. Michiardi, Y. Roudier, Password strength: An empirical analysis, in: Proc. INFOCOM 2010, 2010, pp. 1-9.
-
(2010)
Proc. INFOCOM 2010
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
80
-
-
78751641225
-
On the security of chien's ultralightweight RFID authentication protocol
-
H.-M. Sun, W.-C. Ting, and K.-H. Wang On the security of chien's ultralightweight RFID authentication protocol IEEE Trans. Depend. Secur. Comput. 8 2 2011 315 317
-
(2011)
IEEE Trans. Depend. Secur. Comput.
, vol.8
, Issue.2
, pp. 315-317
-
-
Sun, H.-M.1
Ting, W.-C.2
Wang, K.-H.3
-
81
-
-
84863392461
-
On the security of a ticket-based anonymity system with traceability property in wireless mesh networks
-
H. Wang, and Y. Zhang On the security of a ticket-based anonymity system with traceability property in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 9 3 2012 443 446
-
(2012)
IEEE Trans. Depend. Secur. Comput.
, vol.9
, Issue.3
, pp. 443-446
-
-
Wang, H.1
Zhang, Y.2
-
82
-
-
84871821096
-
Security analysis of a single sign-on mechanism for distributed computer networks
-
G. Wang, J. Yu, and Q. Xie Security analysis of a single sign-on mechanism for distributed computer networks IEEE Trans. Ind. Inform. 9 1 2013 294 302
-
(2013)
IEEE Trans. Ind. Inform.
, vol.9
, Issue.1
, pp. 294-302
-
-
Wang, G.1
Yu, J.2
Xie, Q.3
-
83
-
-
84906756166
-
IPass: Robust smart card based password authentication scheme against smart card loss problem
-
(in press)
-
D. Wang, P. Wang, C.G. Ma, Z. Chen, iPass: robust smart card based password authentication scheme against smart card loss problem, J. Comput. Syst. Sci., (2014) (in press). < http://eprint.iacr.org/2012/439.pdf >.
-
(2014)
J. Comput. Syst. Sci.
-
-
Wang, D.1
Wang, P.2
Ma, C.G.3
Chen, Z.4
-
84
-
-
84868014129
-
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
-
M. Khan, and D. He A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography Secur. Commun. Netw. 5 11 2012 1260 1266
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.11
, pp. 1260-1266
-
-
Khan, M.1
He, D.2
-
85
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
C. Ma, D. Wang, and S.D. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 2012 http://dx.doi.org/10.1002/dac.2468
-
(2012)
Int. J. Commun. Syst.
-
-
Ma, C.1
Wang, D.2
Zhao, S.D.3
-
86
-
-
84906738412
-
Improved privacy-preserving authentication scheme for roaming service in mobile networks
-
D. Wang, P. Wang, J. Liu, Improved privacy-preserving authentication scheme for roaming service in mobile networks, in: Proc. WCNC 2014, 2014, pp. 3178-3183.
-
(2014)
Proc. WCNC 2014
, pp. 3178-3183
-
-
Wang, D.1
Wang, P.2
Liu, J.3
-
87
-
-
84871579251
-
Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
-
L. Xu, Y. Mu, Springer Berlin/Heidelberg
-
D. Wang, C.G. Ma, D.L. Gu, and Z.S. Cui Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture L. Xu, Y. Mu, Proc. NSS 2012, LNCS vol. 7645 2012 Springer Berlin/Heidelberg 462 475
-
(2012)
Proc. NSS 2012, LNCS
, vol.7645
, pp. 462-475
-
-
Wang, D.1
Ma, C.G.2
Gu, D.L.3
Cui, Z.S.4
-
88
-
-
84885231928
-
A strong authentication scheme with user privacy for wireless sensor networks.
-
P. Kumar, A. Gurtov, M. Ylianttila, S.-G. Lee, and H. Lee A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35 5 2013 889 899
-
(2013)
ETRI J.
, vol.35
, Issue.5
, pp. 889-899
-
-
Kumar, P.1
Gurtov, A.2
Ylianttila, M.3
Lee, S.-G.4
Lee, H.5
-
89
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
F. Wu, and L. Xu Security analysis and improvement of a privacy authentication scheme for telecare medical information systems J. Med. Syst. 2014 http://dx.doi.org/10.1007/s10916-013-9958-z
-
(2014)
J. Med. Syst.
-
-
Wu, F.1
Xu, L.2
-
90
-
-
84893037497
-
Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
M.K. Khan, and S. Kumari Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems Secur. Commun. Networks 2013 http://dx.doi.org/10.1002/sec. 791
-
(2013)
Secur. Commun. Networks
-
-
Khan, M.K.1
Kumari, S.2
-
91
-
-
84874650547
-
Spam: A secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks
-
M.-C. Chuang, J.-F. Lee, and M.-C. Chen Spam: A secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks IEEE Syst. J. 7 1 2013 102 113
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.1
, pp. 102-113
-
-
Chuang, M.-C.1
Lee, J.-F.2
Chen, M.-C.3
-
92
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 39
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 1-39
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
93
-
-
84995943281
-
On the Security of Some Smart-Card-Based Remote User Authentication Schemes for wsn
-
D. Wang, C.G. Ma, On the Security of Some Smart-Card-Based Remote User Authentication Schemes for wsn, Cryptology ePrint Archive, Report 2012/581, 2012. < http://eprint.iacr.org/2012/581.pdf >.
-
(2012)
Cryptology EPrint Archive, Report 2012/581
-
-
Wang, D.1
Ma, C.G.2
-
94
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
-
F. Wen, W. Susilo, and G. Yang A secure and effective anonymous user authentication scheme for roaming service in global mobility networks Wireless Pers. Commun. 2013 http://dx.doi.org/10.1007/s11277-013-1243-4
-
(2013)
Wireless Pers. Commun.
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
95
-
-
68849128250
-
Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment
-
H.-C. Hsiang, and W.-K. Shih Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment Comput. Stand. Interfaces 31 6 2009 1118 1123
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.-C.1
Shih, W.-K.2
-
96
-
-
79951480285
-
Improved user authentication scheme with user anonymity for wireless communications
-
M. Kang, S. Rhee, and Y. Choi Improved user authentication scheme with user anonymity for wireless communications IEICE Trans. Fund. Electron. Commun. Comput. Sci. 94 2 2011 860 864
-
(2011)
IEICE Trans. Fund. Electron. Commun. Comput. Sci.
, vol.94
, Issue.2
, pp. 860-864
-
-
Kang, M.1
Rhee, S.2
Choi, Y.3
-
97
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
X. Li, J. Ma, W. Wang, and J. Zhang A novel smart card and dynamic id based remote user authentication scheme for multi-server environments Math. Comput. Model. 58 2 2013 85 95
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.2
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Zhang, J.4
-
98
-
-
84898648439
-
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
-
J. Kim, D. Lee, W. Jeon, Y. Lee, and D. Won Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks Sensors 14 4 2014 6443 6462
-
(2014)
Sensors
, vol.14
, Issue.4
, pp. 6443-6462
-
-
Kim, J.1
Lee, D.2
Jeon, W.3
Lee, Y.4
Won, D.5
-
99
-
-
84906050570
-
An improved remote user authentication scheme with key agreement
-
S. Kumari, M.K. Khan, and X. Li An improved remote user authentication scheme with key agreement Comput. Electrical Eng. 2014 http://dx.doi.org/10. 1016/j.compeleceng.2014.05.007
-
(2014)
Comput. Electrical Eng.
-
-
Kumari, S.1
Khan, M.K.2
Li, X.3
-
100
-
-
84901208306
-
Smart card security from a programming language and static analysis perspective
-
X. Leroy, Smart card security from a programming language and static analysis perspective, INRIA Rocquencourt & Trusted Logic, Tecnical Report, 2013. < http://pauillac.inria.fr/xleroy/talks/language-security-etaps03.pdf >.
-
(2013)
INRIA Rocquencourt & Trusted Logic, Tecnical Report
-
-
Leroy, X.1
-
101
-
-
67649386419
-
Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
-
D. Sun, J. Huai, J. Sun, J. Li, J. Zhang, and Z. Feng Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards IEEE Trans. Ind. Electron. 56 6 2009 2284 2291
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.6
, pp. 2284-2291
-
-
Sun, D.1
Huai, J.2
Sun, J.3
Li, J.4
Zhang, J.5
Feng, Z.6
-
102
-
-
78651364381
-
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
-
T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comput. Network 55 1 2011 205 213
-
(2011)
Comput. Network
, vol.55
, Issue.1
, pp. 205-213
-
-
Zhou, T.1
Xu, J.2
-
103
-
-
84873910697
-
Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects
-
D. He, C. Chen, J. Bu, S. Chan, and Y. Zhang Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects IEEE Commun. Mag. 51 2 2013 142 150
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.2
, pp. 142-150
-
-
He, D.1
Chen, C.2
Bu, J.3
Chan, S.4
Zhang, Y.5
-
104
-
-
84856471625
-
Secure and efficient handover authentication based on bilinear pairing functions
-
D. He, C. Chen, S. Chan, and J. Bu Secure and efficient handover authentication based on bilinear pairing functions IEEE Trans. Wireless Commun. 11 1 2012 48 53
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
105
-
-
85024290278
-
Group signatures
-
D. Davies, Springer Verlag
-
D. Chaum, and E. Heyst Group signatures D. Davies, Proc. EUROCRYPT 1991, LNCS vol. 547 1991 Springer Verlag 257 265
-
(1991)
Proc. EUROCRYPT 1991, LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.2
-
106
-
-
84875591362
-
An efficient threshold anonymous authentication scheme for privacy-preserving communications
-
J. Ren, and L. Harn An efficient threshold anonymous authentication scheme for privacy-preserving communications IEEE Trans. Wireless Commun. 12 3 2013 1018 1025
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.3
, pp. 1018-1025
-
-
Ren, J.1
Harn, L.2
-
107
-
-
84880049034
-
A generic framework for anonymous authentication in mobile networks
-
J. Xu, and W.-T. Zhu A generic framework for anonymous authentication in mobile networks J. Comput. Sci. Technol. 28 4 2013 732 742
-
(2013)
J. Comput. Sci. Technol.
, vol.28
, Issue.4
, pp. 732-742
-
-
Xu, J.1
Zhu, W.-T.2
-
108
-
-
84860648863
-
A privacy-protecting authentication scheme for roaming services with smart cards
-
K. Son, D. Han, and D. Won A privacy-protecting authentication scheme for roaming services with smart cards IEICE Trans. Commun. 95 5 2012 1819 1821
-
(2012)
IEICE Trans. Commun.
, vol.95
, Issue.5
, pp. 1819-1821
-
-
Son, K.1
Han, D.2
Won, D.3
-
109
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
M. Wiener, Springer Verlag
-
E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes M. Wiener, Proc. CRYPTO 1999, LNCS vol. 1666 1999 Springer Verlag 537 554
-
(1999)
Proc. CRYPTO 1999, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
110
-
-
78651364381
-
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
-
T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comput. Netw. 55 1 2011 205 213
-
(2011)
Comput. Netw.
, vol.55
, Issue.1
, pp. 205-213
-
-
Zhou, T.1
Xu, J.2
-
111
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Proc. EUROCRYPT 2000, LNCS vol. 1807 2000 Springer Verlag 139 155
-
(2000)
Proc. EUROCRYPT 2000, LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
112
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
M. Abdalla, P.-A. Fouque, and D. Pointcheval Password-based authenticated key exchange in the three-party setting S. Vaudenay, Proc. PKC 2005, LNCS vol. 3386 2005 Springer Verlag 65 84 (Pubitemid 41231326)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
113
-
-
78650941074
-
Simplified OAEP for the RSA and Rabin Functions
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh Simplified OAEP for the RSA and Rabin functions J. Kilian, Proc. CRYPTO 2001, LNCS vol. 2139 2001 Springer Verlag 275 291 (Pubitemid 33317921)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 275-291
-
-
Boneh, D.1
-
114
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
115
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM J. Comput. 32 3 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
116
-
-
84859393217
-
Practical rsa signature scheme based on periodical rekeying for wireless sensor networks
-
S.-Y. Chang, Y.-H. Lin, H.-M. Sun, and M.-E. Wu Practical rsa signature scheme based on periodical rekeying for wireless sensor networks ACM Trans. Sen. Network 8 2 2012 13
-
(2012)
ACM Trans. Sen. Network
, vol.8
, Issue.2
, pp. 13
-
-
Chang, S.-Y.1
Lin, Y.-H.2
Sun, H.-M.3
Wu, M.-E.4
-
117
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
1392772, Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
-
A.S. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz Energy analysis of public-key cryptography for wireless sensor networks Proc. PerCom 2005 2005 IEEE 324 328 (Pubitemid 43727945)
-
(2005)
Proceedings - Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005
, vol.2005
, pp. 324-328
-
-
Wandert, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
118
-
-
33750710411
-
Implementing cryptographic pairings on smartcards
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
M. Scott, N. Costigan, and W. Abdulwahab Implementing cryptographic pairings on smartcards L. Goubin, M. Matsui, CHES 2006, LNCS vol. 4249 2006 Springer Verlag 134 147 (Pubitemid 44700054)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4249
, pp. 134-147
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
119
-
-
70349154616
-
On the application of pairing based cryptography to wireless sensor networks
-
ACM
-
P. Szczechowiak, A. Kargl, M. Scott, and M. Collier On the application of pairing based cryptography to wireless sensor networks Proc. WiSec 2009 2009 ACM 1 12
-
(2009)
Proc. WiSec 2009
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
|