-
1
-
-
84919453382
-
User authentication in sensor networks
-
Z. Benenson, C.G. Felix, K. Dogan, User authentication in sensor networks, in: 2004 Proceedings of Workshop Sensor Networks, 2004, pp. 385-389.
-
(2004)
2004 Proceedings of Workshop Sensor Networks
, pp. 385-389
-
-
Benenson, Z.1
Felix, C.G.2
Dogan, K.3
-
2
-
-
34250787561
-
Realizing robust user authentication in sensor networks
-
Z. Benenson, N. Gedicke, O. Raivio, Realizing robust user authentication in sensor networks, in: Proceedings of Workshop on Real-world Wireless Sensor Networks, 2005, pp. 1-6.
-
(2005)
Proceedings of Workshop on Real-world Wireless Sensor Networks
, pp. 1-6
-
-
Benenson, Z.1
Gedicke, N.2
Raivio, O.3
-
3
-
-
74049156258
-
Robust dynamic user authentication scheme for ireless sensor networks
-
V. Binod, S.S. Jorge, J.P. Joel, Robust dynamic user authentication scheme for ireless sensor networks, in: Proceedings of ACM Q2SWinet, 2009, pp. 88-91.
-
(2009)
Proceedings of ACM Q2SWinet
, pp. 88-91
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.3
-
4
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
V. Binod, S.S. Jorge, and J.P. Joel User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Int. J. Commun. Syst. 23 9 2010 1201 1222
-
(2010)
Int. J. Commun. Syst.
, vol.23
, Issue.9
, pp. 1201-1222
-
-
Binod, V.1
Jorge, S.S.2
Joel, J.P.3
-
6
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 2 5 2010 704 712
-
(2010)
ETRI J.
, vol.2
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
7
-
-
2942686425
-
Sensor networks: evolution, opportunities and challenges
-
C.Y. Chong, and S. Kumar Sensor networks: evolution, opportunities and challenges Proc. IEEE 91 8 2003 1247 1256
-
(2003)
Proc. IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
8
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 2009 1086 1090
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.1
-
9
-
-
84922001116
-
Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
-
D. He, N. Kumar, and M.K. Khan Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks Multimedia Syst. 2014 10.1007/s00530-013-0346-9
-
(2014)
Multimedia Syst.
-
-
He, D.1
Kumar, N.2
Khan, M.K.3
-
10
-
-
84898048082
-
Enhanced three-factor security protocol for USB consumer storage devices
-
2014
-
D. He, N. Kumar, and J.-H. Lee Enhanced three-factor security protocol for USB consumer storage devices IEEE Trans. Consum. Electron. 60 1 2014 30 37 (2014)
-
(2014)
IEEE Trans. Consum. Electron.
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
11
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
D. He, and D. Wang Robust biometrics-based authentication scheme for multi-server environment IEEE Syst. J. 2014 10.1109/JSYST.2014.2301517
-
(2014)
IEEE Syst. J.
-
-
He, D.1
Wang, D.2
-
12
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
D. He, Y. Zhang, and J. Chen Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks Wirel. Pers. Commun. 74 2 2014 229 243
-
(2014)
Wirel. Pers. Commun.
, vol.74
, Issue.2
, pp. 229-243
-
-
He, D.1
Zhang, Y.2
Chen, J.3
-
13
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks' Sensors 10 3 2010 2450 2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
14
-
-
62449290253
-
A novel dynamic user authentication scheme for wireless sensor networks
-
L.C. Ko, A novel dynamic user authentication scheme for wireless sensor networks, in: Proceedings of IEEE ISWCS, 2008, pp. 608-612.
-
(2008)
Proceedings of IEEE ISWCS
, pp. 608-612
-
-
Ko, L.C.1
-
15
-
-
84939573910
-
Differential power analysis
-
P.C. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: CRYPTO99, 1999, pp. 388-397.
-
(1999)
CRYPTO99
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
17
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
T.S. Messerges, A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, A.2
Sloan, R.H.3
-
19
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
W. Shi, and P. Gong A new user authentication protocol for wireless sensor networks using elliptic curves cryptography Int. J. Distrib. Sens. Netw. 2013 7 (Article ID 730831)
-
(2013)
Int. J. Distrib. Sens. Netw.
, pp. 7
-
-
Shi, W.1
Gong, P.2
-
20
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
H.R. Tseng, R.H. Jan, W. Yang, An improved dynamic user authentication scheme for wireless sensor networks, in: Proceedings of IEEE Globecom, 2007, pp. 986-990.
-
(2007)
Proceedings of IEEE Globecom
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
21
-
-
14844304757
-
Securing sensor networks with public key technology
-
R. Watro, K. Derrick, C. Sue-fen, et al., Securing sensor networks with public key technology, in: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Derrick, K.2
Sue-fen, C.3
-
22
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
K.H. Wong, Z. Yuan, C. Jiannong, W. Shengwei, A dynamic user authentication scheme for wireless sensor networks, in: Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006, pp. 244-251.
-
(2006)
Proceedings of Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 244-251
-
-
Wong, K.H.1
Yuan, Z.2
Jiannong, C.3
Shengwei, W.4
-
23
-
-
84870693016
-
A temporal-credential-based MAAKA scheme for wireless sensor networks
-
K. Xue, C. Ma, P. Hong, and et al. A temporal-credential-based MAAKA scheme for wireless sensor networks J. Netw. Comput. Appl. 36 1 2013 316 323
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
-
24
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
H.L. Yeh, T.H. Chen, P.C. Liu, and et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
-
25
-
-
84901234489
-
An enhanced two-factor user authentication in wireless sensor networks
-
J.J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 55 1 2014 105 113
-
(2014)
Telecommun. Syst.
, vol.55
, Issue.1
, pp. 105-113
-
-
Yuan, J.J.1
|