-
1
-
-
84904043180
-
Wireless sensor networks: A survey on recent developments and potential synergies
-
Rawat, P.; Singh, K.; Chaouchi, H.; Bonnin, J. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014, 68, 1–48.
-
(2014)
J. Supercomput
, vol.68
, pp. 1-48
-
-
Rawat, P.1
Singh, K.2
Chaouchi, H.3
Bonnin, J.4
-
2
-
-
79957718973
-
RUASN: A robust user authentication framework for wireless sensor networks
-
Kumar, P.; Choudhury, A.; Sain, M.; Lee, S.; Lee, H. RUASN: A robust user authentication framework for wireless sensor networks. Sensors 2011, 11, 5020–5046.
-
(2011)
Sensors
, vol.11
, pp. 5020-5046
-
-
Kumar, P.1
Choudhury, A.2
Sain, M.3
Lee, S.4
Lee, H.5
-
3
-
-
84901008838
-
An improved user authentication protocol for healthcare services via wireless medical sensor networks
-
347169
-
Khan, M.; Kumari, S. An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014, No. 347169.
-
(2014)
Int. J. Distrib. Sens. Netw
, pp. 2014
-
-
Khan, M.1
Kumari, S.2
-
4
-
-
33646779184
-
Errors in computational complexity proofs for protocols
-
Chennai, India, 4–8 December
-
Choo, K.K.R.; Boyd, C.; Hitchcock, Y. Errors in computational complexity proofs for protocols. In Proceedings of ASIACRYPT 2005, Chennai, India, 4–8 December 2005; pp. 624–643.
-
(2005)
Proceedings of ASIACRYPT 2005
, pp. 624-643
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
5
-
-
77958106074
-
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
-
Nam, J.; Paik, J.; Won, D. A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Inf. Sci. 2011, 181, 234–238.
-
(2011)
Inf. Sci
, vol.181
, pp. 234-238
-
-
Nam, J.1
Paik, J.2
Won, D.3
-
6
-
-
84891596035
-
Dictionary attacks against password-based authenticated three-party key exchange protocols
-
Nam, J.; Choo, K.K.R.; Kim, M.; Paik, J.; Won, D. Dictionary attacks against password-based authenticated three-party key exchange protocols. KSII Trans. Internet Inf. Syst. 2013, 7, 3244–3260.
-
(2013)
KSII Trans. Internet Inf. Syst
, vol.7
, pp. 3244-3260
-
-
Nam, J.1
Choo, K.K.R.2
Kim, M.3
Paik, J.4
Won, D.5
-
7
-
-
33845638668
-
Refuting security proofs for tripartite key exchange with model checker in planning problem setting
-
Venice, Italy, 5–7 July
-
Choo, K.K.R. Refuting security proofs for tripartite key exchange with model checker in planning problem setting. In Proceedings of 19th IEEE Computer Security Foundations Workshop, Venice, Italy, 5–7 July 2006; pp. 297–308.
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 297-308
-
-
Choo, K.K.R.1
-
9
-
-
0020720357
-
On the security of public key protocols
-
Dolev, D.; Yao, A. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Bruges, Belgium, 14–18 May
-
Bellare, M.; Pointcheval, D.; Rogaway, P. Authenticated key exchange secure against dictionary attacks. In Proceedings of EUROCRYPT 2000, Bruges, Belgium, 14–18 May 2000; pp. 139–155.
-
(2000)
Proceedings of EUROCRYPT 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
11
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Innsbruck, Austria, 6–10 May
-
Canetti, R.; Krawczyk, H. Analysis of key-exchange protocols and their use for building secure channels. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, Innsbruck, Austria, 6–10 May 2001; pp. 453–474.
-
(2001)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090.
-
(2009)
IEEE Trans. Wirel. Commun
, vol.8
, pp. 1086-1090
-
-
Das, M.1
-
13
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D.; Gao, Y.; Chan, S.; Chen, C.; Bu, J. An enhanced two-factor user authentication scheme in wireless sensor networks. Adhoc Sens. Wirel. Netw. 2010, 10, 361–371.
-
(2010)
Adhoc Sens. Wirel. Netw
, vol.10
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
14
-
-
77955495427
-
Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”
-
Khan, M.; Alghathbar, K. Cryptanalysis and security improvements of “two-factor user authentication in wireless sensor networks”. Sensors 2010, 10, 2450–2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.1
Alghathbar, K.2
-
15
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen, T.; Shih, W. A robust mutual authentication protocol for wireless sensor networks. ETRI J. 2010, 32, 704–712.
-
(2010)
ETRI J
, vol.32
, pp. 704-712
-
-
Chen, T.1
Shih, W.2
-
16
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh, H.; Chen, T.; Liu, P.; Kim, T.; Wei, H. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767–4779.
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.1
Chen, T.2
Liu, P.3
Kim, T.4
Wei, H.5
-
17
-
-
84863271667
-
E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
Kumar, P.; Lee, S.; Lee, H. E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012, 12, 1625–1647.
-
(2012)
Sensors
, vol.12
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.2
Lee, H.3
-
18
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
No. 382810
-
Yoo, S.; Park, K.; Kim, J. A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 2012, No. 382810.
-
(2012)
Int. J. Distrib. Sens. Netw
, pp. 2012
-
-
Yoo, S.1
Park, K.2
Kim, J.3
-
19
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
Vaidya, B.; Makrakis, D.; Mouftah, H. Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw. 2012, doi:10.1002/sec.517.
-
(2012)
Secur. Commun. Netw
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
20
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue, K.; Ma, C.; Hong, P.; Ding, R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 316–323.
-
(2013)
J. Netw. Comput. Appl
, vol.36
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
21
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
No. 730831
-
Shi, W.; Gong, P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 2013, 2013, No. 730831.
-
(2013)
Int. J. Distrib. Sens. Netw
, pp. 2013
-
-
Shi, W.1
Gong, P.2
-
22
-
-
84885231928
-
A strong authentication scheme with user privacy for wireless sensor networks
-
Kumar, P.; Gurtov, A.; Ylianttila, M.; Lee, S.; Lee, H. A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 2013, 35, 889–899.
-
(2013)
ETRI J
, vol.35
, pp. 889-899
-
-
Kumar, P.1
Gurtov, A.2
Ylianttila, M.3
Lee, S.4
Lee, H.5
-
23
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
-
He, D.; Kumar, N.; Chen, J.; Lee, C.; Chilamkurti, N.; Yeo, S. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 2013, doi:10.1007/s00530-013-0346-9.
-
(2013)
Multimed. Syst
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.4
Chilamkurti, N.5
Yeo, S.6
-
24
-
-
84899502865
-
Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks
-
637684
-
Chi, L.; Hu, L.; Li, H.; Chu, J. Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014, No. 637684.
-
(2014)
Int. J. Distrib. Sens. Netw
, pp. 2014
-
-
Chi, L.1
Hu, L.2
Li, H.3
Chu, J.4
-
25
-
-
84898648439
-
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
-
Kim, J.; Lee, D.; Jeon, W.; Lee, Y.; Won, D. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 2014, 14, 6443–6462.
-
(2014)
Sensors
, vol.14
, pp. 6443-6462
-
-
Kim, J.1
Lee, D.2
Jeon, W.3
Lee, Y.4
Won, D.5
-
26
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang, Q.; Ma, J.; Lu, X.; Tian, Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 2014, doi:10.1007/s12083-014-0285-z.
-
(2014)
Peer-to-Peer Netw. Appl
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
27
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2014, 14, 10081–10106.
-
(2014)
Sensors
, vol.14
, pp. 10081-10106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
28
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA, 15–19 August
-
Kocher, P.; Jaffe, J.; Jun, B. Differential power analysis. In Proceedings of CRYPTO 1999, Santa Barbara, CA, USA, 15–19 August 1999; pp. 388–397.
-
(1999)
Proceedings of CRYPTO 1999
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
29
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.; Dabbish, E.; Sloan, R. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552.
-
(2002)
IEEE Trans. Comput
, vol.51
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
31
-
-
80052427734
-
Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks
-
London, UK, 20–22 June
-
Kumar, P.; Lee, H. Cryptanalysis on two user authentication protocols using smart card or wireless sensor networks. In Proceedings of the IEEE Wireless Advanced (WiAd), London, UK, 20–22 June 2011; pp. 241–245.
-
(2011)
Proceedings of the IEEE Wireless Advanced (WiAd)
, pp. 241-245
-
-
Kumar, P.1
Lee, H.2
-
32
-
-
84929941120
-
Password-only authenticated three-party key exchange proven secure against insider dictionary attacks
-
802359
-
Nam, J.; Choo, K.K.R.; Paik, J.; Won, D. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. Sci. World J. 2014, 2014, No. 802359.
-
(2014)
Sci. World J
, pp. 2014
-
-
Nam, J.1
Choo, K.K.R.2
Paik, J.3
Won, D.4
-
33
-
-
84891688392
-
Anonymous two-factor authentication for consumer roaming service in global mobility networks
-
He, D.; Kumar, N.; Khan, M.; Lee, J. Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consum. Electron. 2013, 59, 811–817.
-
(2013)
IEEE Trans. Consum. Electron
, vol.59
, pp. 811-817
-
-
He, D.1
Kumar, N.2
Khan, M.3
Lee, J.4
-
34
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
He, D.; Zhang, Y.; Chen, J. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 2014, 74, 229–243.
-
(2014)
Wirel. Pers. Commun
, vol.74
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
35
-
-
84898048082
-
Enhanced three-factor security protocol for USB mass storage devices
-
He, D.; Kumar, N.; Lee, J.; Sherratt, R. Enhanced three-factor security protocol for USB mass storage devices. IEEE Trans. Consum. Electron. 2014, 60, 30–37.
-
(2014)
IEEE Trans. Consum. Electron
, vol.60
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.3
Sherratt, R.4
|