-
1
-
-
0037086890
-
Wireless sensor networks: a survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38(4):393–422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
77956882701
-
Wireless sensor networks for healthcare: a survey
-
Alemdar H, Ersoy C. Wireless sensor networks for healthcare: a survey. Computer Networks 2010; 54(15):2688–2710.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2688-2710
-
-
Alemdar, H.1
Ersoy, C.2
-
3
-
-
84863271667
-
E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
Kumar P, Lee SG, Lee HJ. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012; 12(2):1625–1647.
-
(2012)
Sensors
, vol.12
, Issue.2
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.G.2
Lee, H.J.3
-
4
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
-
Li X, Ma J, Wang WD, Xiong YP, Zhang JS. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Mathematical and Computer Modelling 2013; 58(1):85–95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.1
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.D.3
Xiong, Y.P.4
Zhang, J.S.5
-
5
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
Li X, Xiong YP, Ma J, Wang WD. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763–769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.P.2
Ma, J.3
Wang, W.D.4
-
6
-
-
84938960924
-
An enhancement of a smart card authentication scheme for multi-server architecture
-
Li X, Niu JW, Kumari S, Liao JG, Liang W. An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications 2015; 80(1):175–192.
-
(2015)
Wireless Personal Communications
, vol.80
, Issue.1
, pp. 175-192
-
-
Li, X.1
Niu, J.W.2
Kumari, S.3
Liao, J.G.4
Liang, W.5
-
7
-
-
84903725812
-
Privacy and authentication protocol for mobile RFID systems
-
Niu B, Zhu X, Chi H, Li H. Privacy and authentication protocol for mobile RFID systems. Wireless Personal Communications 2014; 77(3):1713–1731.
-
(2014)
Wireless Personal Communications
, vol.77
, Issue.3
, pp. 1713-1731
-
-
Niu, B.1
Zhu, X.2
Chi, H.3
Li, H.4
-
9
-
-
36348970576
-
Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign
-
Hu F, Jiang M, Wagner M, Dong DC. Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign. IEEE Transactions on Information Technology in Biomedicine 2007; 11(6):619–627.
-
(2007)
IEEE Transactions on Information Technology in Biomedicine
, vol.11
, Issue.6
, pp. 619-627
-
-
Hu, F.1
Jiang, M.2
Wagner, M.3
Dong, D.C.4
-
10
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH. Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications 2009; 27(4):400–411.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
11
-
-
70349646298
-
Design and implementation of a securewireless mote-based medical sensor network
-
Malasri K, Wang L. Design and implementation of a securewireless mote-based medical sensor network. Sensors 2009; 9(8):6273–6297.
-
(2009)
Sensors
, vol.9
, Issue.8
, pp. 6273-6297
-
-
Malasri, K.1
Wang, L.2
-
12
-
-
79953065589
-
An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare
-
Le XH, Khalid M, Sankar R, Lee S. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks 2011; 6(3):355–364.
-
(2011)
Journal of Networks
, vol.6
, Issue.3
, pp. 355-364
-
-
Le, X.H.1
Khalid, M.2
Sankar, R.3
Lee, S.4
-
13
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3):1086–1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
14
-
-
84862773089
-
Improvement of Das's two-factor authentication protocol in wireless sensor networks
-
Nyang D, Lee MK. Improvement of Das's two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive 2009; 2009:631.
-
(2009)
IACR Cryptology ePrint Archive
, vol.2009
, pp. 631
-
-
Nyang, D.1
Lee, M.K.2
-
15
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
Darmstadt, Germany
-
Huang HF, Chang YF, Liu CH. Enhancement of two-factor user authentication in wireless sensor networks. In Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'10), Darmstadt, Germany, 2010; 27–30.
-
(2010)
In Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, (IIH-MSP'10)
, pp. 27-30
-
-
Huang, H.F.1
Chang, Y.F.2
Liu, C.H.3
-
16
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5):704–712.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
17
-
-
77955495427
-
Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’. Sensors 2010; 10(3):2450–2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
18
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011; 11(5):4767–4779.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
19
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. International Journal of Distributed Sensor Networks 2013, Article ID 730831: 7 pages. DOI: 10.1155/2013/730831.
-
(2013)
International Journal of Distributed Sensor Networks
, pp. 7
-
-
Shi, W.1
Gong, P.2
-
20
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
-
In press, 10 Dec 2013
-
He DB, Kumar N, Chen JH, Lee CC, Chilamkurti N, Yeo SS. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, In press, 10 Dec 2013, DOI: 10.1007/s00530-013-0346-9.
-
Multimedia Systems
-
-
He, D.B.1
Kumar, N.2
Chen, J.H.3
Lee, C.C.4
Chilamkurti, N.5
Yeo, S.S.6
-
21
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li X, Niu JW, Ma J, Wang WD, Liu CL. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73–79.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.W.2
Ma, J.3
Wang, W.D.4
Liu, C.L.5
-
22
-
-
84908157951
-
Applying biometrics to design three-factor remote user authentication scheme with key agreement
-
Li X, Niu JW, Wang ZB, Chen CS. Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 2014; 7(10):1488–1497.
-
(2014)
Security and Communication Networks
, vol.7
, Issue.10
, pp. 1488-1497
-
-
Li, X.1
Niu, J.W.2
Wang, Z.B.3
Chen, C.S.4
-
23
-
-
84979231101
-
Robust three-factor remote user authentication scheme with key agreement for multimedia systems
-
Li X, Niu JW, Khan MK, Liao JG, Zhao XK. Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks 2014, DOI: 10.1002/sec.961.
-
(2014)
Security and Communication Networks
-
-
Li, X.1
Niu, J.W.2
Khan, M.K.3
Liao, J.G.4
Zhao, X.K.5
-
24
-
-
85027949488
-
Robust biometrics-based authentication scheme for multiserver environment
-
He DB, Wang D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal 2013, DOI: 10.1109/JSYST.2014.2301517.
-
(2013)
IEEE Systems Journal
-
-
He, D.B.1
Wang, D.2
-
26
-
-
12344259813
-
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
-
Jin ATB, Ling DNC, Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 2004; 37(11):2245–2255.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
27
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini A, Nanni L. An improved biohashing for human authentication. Pattern Recognition 2007; 40(3):1057–1065.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
28
-
-
78149480833
-
Biohashing for securing minutiae template
-
Istanbul, Turkey
-
Belguechi R, Rosenberger C, Ait-Aoudia S. Biohashing for securing minutiae template. In 20th International Conference on Pattern Recognition (ICPR'10), Istanbul, Turkey, 2010; 1168–1171.
-
(2010)
In 20th International Conference on Pattern Recognition, (ICPR'10)
, pp. 1168-1171
-
-
Belguechi, R.1
Rosenberger, C.2
Ait-Aoudia, S.3
-
29
-
-
84939573910
-
Differential power analysis
-
In, Springer, Berlin Heidelberg
-
Kocher P, Jaffe J, Jun B, Differential power analysis. In Advances in Cryptology-CRYPTO'99. Springer: Berlin Heidelberg, 1999; 388–397.
-
(1999)
Advances in Cryptology-CRYPTO'99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
30
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
32
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Wang D, Wang P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 2014; 20:1–15.
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
33
-
-
79956064800
-
A user friendly authentication scheme with anonymity for wireless communications
-
Yoon EJ, Yoo KY, Ha KS. A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering 2011; 37(3):356–364.
-
(2011)
Computers & Electrical Engineering
, vol.37
, Issue.3
, pp. 356-364
-
-
Yoon, E.J.1
Yoo, K.Y.2
Ha, K.S.3
-
34
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
He DJ, Ma MD, Zhang Y, Chen C, Bu JJ. A strong user authentication scheme with smart cards for wireless communications. Computer Communications 2011; 34(3):367–374.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.J.1
Ma, M.D.2
Zhang, Y.3
Chen, C.4
Bu, J.J.5
-
35
-
-
82755189733
-
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
-
Li CT, Lee CC. A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling 2012; 55(1):35–44.
-
(2012)
Mathematical and Computer Modelling
, vol.55
, Issue.1
, pp. 35-44
-
-
Li, C.T.1
Lee, C.C.2
-
36
-
-
84911978076
-
Untraceable dynamic identity-based remote user authentication scheme with verifiable password update
-
Chang YF, Tai WL, Chang HC. Untraceable dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2014; 27(11):3430–3440.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.11
, pp. 3430-3440
-
-
Chang, Y.F.1
Tai, W.L.2
Chang, H.C.3
|