-
1
-
-
84904043180
-
Wireless sensor networks: A survey on recent developments and potential synergies
-
Rawat P, Singh K, Chaouchi H, Bonnin J (2014) Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of Supercomputing 68: 1-48.
-
(2014)
The Journal of Supercomputing
, vol.68
, pp. 1-48
-
-
Rawat, P.1
Singh, K.2
Chaouchi, H.3
Bonnin, J.4
-
2
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das M (2009) Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wirelelss Communications 8: 1086-1090. doi: 10.1109/TWC.2008.080128
-
(2009)
IEEE Transactions on Wirelelss Communications
, vol.8
, pp. 1086-1090
-
-
Das, M.1
-
3
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 10: 361-371.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
4
-
-
77955495427
-
Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks"
-
PMID: 22294935
-
Khan M, Alghathbar K (2010) Cryptanalysis and security improvements of "two-factor user authentication in wireless sensor networks". Sensors 10: 2450-2459. doi: 10.3390/s100302450 PMID: 22294935
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.1
Alghathbar, K.2
-
5
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen T, ShihW(2010) A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 32: 704-712. doi: 10.4218/etrij.10.1510.0134
-
(2010)
ETRI Journal
, vol.32
, pp. 704-712
-
-
Chen, T.1
Shih, W.2
-
6
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
PMID: 22163874
-
Yeh H, Chen T, Liu P, Kim T, Wei H (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11: 4767-4779. doi: 10.3390/s110504767 PMID: 22163874
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.1
Chen, T.2
Liu, P.3
Kim, T.4
Wei, H.5
-
7
-
-
79957718973
-
RUASN:A robust user authentication framework for wireless sensor networks
-
PMID: 22163888
-
Kumar P, Choudhury A, Sain M, Lee S, Lee H (2011) RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11: 5020-5046. doi: 10.3390/s110505020 PMID: 22163888
-
(2011)
Sensors
, vol.11
, pp. 5020-5046
-
-
Kumar, P.1
Choudhury, A.2
Sain, M.3
Lee, S.4
Lee, H.5
-
8
-
-
84863271667
-
E-SAP:Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
-
PMID: 22438729
-
Kumar P, Lee S, Lee H (2012) E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12: 1625-1647. doi: 10.3390/s120201625 PMID: 22438729
-
(2012)
Sensors
, vol.12
, pp. 1625-1647
-
-
Kumar, P.1
Lee, S.2
Lee, H.3
-
9
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
Yoo S, Park K, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012: Article ID 382810.
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
, pp. 382810
-
-
Yoo, S.1
Park, K.2
Kim, J.3
-
11
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 36: 316-323. doi: 10.1016/j.jnca.2012.05.010
-
(2013)
Journal of Network and Computer Applications
, vol.36
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
12
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Internation Journal of Distributed Sensor Networks 2013: Article ID 730831.
-
(2013)
Internation Journal of Distributed Sensor Networks
, vol.2013
, pp. 730831
-
-
Shi, W.1
Gong, P.2
-
13
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
-
PMID: 23887085
-
Li C, Weng C, Lee C (2013) An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 13: 9589-9603. doi: 10.3390/ s130809589 PMID: 23887085
-
(2013)
Sensors
, vol.13
, pp. 9589-9603
-
-
Li, C.1
Weng, C.2
Lee, C.3
-
14
-
-
84885231928
-
A strong authentication scheme with user privacy for wireless sensor networks
-
Kumar P, Gurtov A, Ylianttila M, Lee S, Lee H (2013) A strong authentication scheme with user privacy for wireless sensor networks. ETRI Journal 35: 889-899. doi: 10.4218/etrij.13.0113.0103
-
(2013)
ETRI Journal
, vol.35
, pp. 889-899
-
-
Kumar, P.1
Gurtov, A.2
Ylianttila, M.3
Lee, S.4
Lee, H.5
-
15
-
-
84928882064
-
-
Multimedia Systems
-
He D, Kumar N, Chen J, Lee C, Chilamkurti N, Yeo S (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems.
-
(2013)
Robust Anonymous Authentication Protocol for Health-care Applications Using Wireless Medical Sensor Networks.
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.4
Chilamkurti, N.5
Yeo, S.6
-
16
-
-
84899502865
-
Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks
-
Chi L, Hu L, Li H, Chu J (2014) Analysis and improvement of a robust user authentication framework for ubiquitous sensor networks. International Journal of Distributed Sensor Networks 2014: Article ID 637684.
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
, pp. 637684
-
-
Chi, L.1
Hu, L.2
Li, H.3
Chu, J.4
-
17
-
-
84898648439
-
Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks
-
PMID: 24721764
-
Kim J, Lee D, Jeon W, Lee Y, Won D (2014) Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14: 6443-6462. doi: 10.3390/ s140406443 PMID: 24721764
-
(2014)
Sensors
, vol.14
, pp. 6443-6462
-
-
Kim, J.1
Lee, D.2
Jeon, W.3
Lee, Y.4
Won, D.5
-
18
-
-
84901008838
-
An improved user authentication protocol for healthcare services via wireless medical sensor networks
-
Khan M, Kumari S (2014) An improved user authentication protocol for healthcare services via wireless medical sensor networks. Internation Journal of Distributed Sensor Networks 2014: Article ID 347169.
-
(2014)
Internation Journal of Distributed Sensor Networks
, vol.2014
, pp. 347169
-
-
Khan, M.1
Kumari, S.2
-
20
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
PMID: 24919012
-
Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14: 10081-10106. doi: 10.3390/ s140610081 PMID: 24919012
-
(2014)
Sensors
, vol.14
, pp. 10081-10106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
21
-
-
84868014129
-
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
-
Khan M, He D (2012) A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks 5: 1260-1266.
-
(2012)
Security and Communication Networks
, vol.5
, pp. 1260-1266
-
-
Khan, M.1
He, D.2
-
22
-
-
84878471679
-
Cryptanalysis of an 'efficient-strong authentiction protocol (E-SAP) for healthcare applications using wireless medical sensor networks'
-
Khan M, Kumari S, Singh P (2013) Cryptanalysis of an 'efficient-strong authentiction protocol (E-SAP) for healthcare applications using wireless medical sensor networks'. KSII Transactions on Internet & Information Systems 7: 967-979. doi: 10.3837/tiis.2013.05.002
-
(2013)
KSII Transactions on Internet & Information Systems
, vol.7
, pp. 967-979
-
-
Khan, M.1
Kumari, S.2
Singh, P.3
-
23
-
-
84891688392
-
Anonymous two-factor authentication for consumer roaming service in global mobility networks
-
He D, Kumar N, Khan M, Lee J (2013) Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Transactions on Consumer Electronics 59: 811-817. doi: 10. 1109/TCE.2013.6689693
-
(2013)
IEEE Transactions on Consumer Electronics
, vol.59
, pp. 811-817
-
-
He, D.1
Kumar, N.2
Khan, M.3
Lee, J.4
-
24
-
-
84895058980
-
Robust anonymous two-factor authentication scheme for roaming service in global mobility network
-
Xie Q, Hu B, Tan X, Bao M, Yu X (2014) Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications 74: 601-614. doi: 10.1007/ s11277-013-1309-3
-
(2014)
Wireless Personal Communications
, vol.74
, pp. 601-614
-
-
Xie, Q.1
Hu, B.2
Tan, X.3
Bao, M.4
Yu, X.5
-
25
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74: 229-243. doi: 10.1007/ s11277-013-1282-x
-
(2014)
Wireless Personal Communications
, vol.74
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
26
-
-
84939573910
-
-
Proceedings of CRYPTO 1999, Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. Proceedings of CRYPTO 1999, Santa Barbara, California, USA, pp. 388-397.
-
(1999)
Differential Power Analysis
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges T, Dabbish E, Sloan R (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51: 541-552. doi: 10.1109/TC.2002.1004593
-
(2002)
IEEE Transactions on Computers
, vol.51
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
28
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for realtime applications in hierarchical wireless sensor networks
-
Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for realtime applications in hierarchical wireless sensor networks. Ad Hoc Networks 20: 1-15. doi: 10.1016/j. adhoc.2014.03.003
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
29
-
-
84906774949
-
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
-
Wang D, Wang P (2014) On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks 73: 41-57. doi: 10.1016/j.comnet. 2014.07.010
-
(2014)
Computer Networks
, vol.73
, pp. 41-57
-
-
Wang, D.1
Wang, P.2
-
30
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
2000, Bruges, Belgium
-
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. Proceedings of EUROCRYPT 2000, Bruges, Belgium, pp. 139-155.
-
(2000)
Proceedings of EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
33
-
-
84922002292
-
Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
HanW(2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive. Available: http://eprint.iacr.org/2011/293.
-
(2011)
IACR Cryptology ePrint Archive
-
-
Han, W.1
|