-
1
-
-
58449088433
-
Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security
-
Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. Cryptology and Network Security. Springer, pp 133–148
-
(2008)
Springer
, pp. 133-148
-
-
Abdalla, M.1
Izabachene, M.2
Pointcheval, D.3
-
2
-
-
18744393738
-
Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 241–250
-
Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 241–250. ACM
-
(2003)
ACM
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
3
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. Etri Journal 32(5):704–712
-
(2010)
Etri Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
4
-
-
84880153208
-
Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Math Probl Eng 2013
-
858579
-
Chiou SY (2013) Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Math Probl Eng 2013, Article ID 858579
-
(2013)
Article ID
-
-
Chiou, S.Y.1
-
5
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10, 081–10,106
-
(2014)
Sensors
, vol.14
, Issue.6
, pp. 10, 081-10,106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
6
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE T Wirel Commun 8 (3):1086–1090
-
(2009)
IEEE T Wirel Commun
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
7
-
-
79960062320
-
An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
-
Fan R, He Dj, Pan Xz (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C 12(7):550–560
-
(2011)
J Zhejiang Univ Sci C
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
He, D.2
Pan, X.3
-
8
-
-
84922002292
-
Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptology ePrint Archive 2011:293
-
(2011)
IACR Cryptology ePrint Archive
, vol.2011
, pp. 293
-
-
Han, W.1
-
9
-
-
84879121354
-
Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks
-
He D, Chen C, Chan S, Bu J, Yang LT (2013) Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Trans Ind Electron 60(11):5348–5354
-
(2013)
IEEE Trans Ind Electron
, vol.60
, Issue.11
, pp. 5348-5354
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Yang, L.T.5
-
10
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sensor Wirel Netw 10(4):361–371
-
(2010)
Ad Hoc Sensor Wirel Netw
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
11
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst
-
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2013) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst. doi:10.1007/s00530-013-0346-9
-
(2013)
doi:10.1007/s00530-013-0346-9
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.C.4
Chilamkurti, N.5
Yeo, S.S.6
-
12
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8(6):1070–1081. doi:10.1007/s12083-014-0285-z
-
(2015)
Peer-to-Peer Netw Appl
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
13
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
14
-
-
84939573910
-
Differential power analysis. In: Advances in Cryptology-CRYPTO99, pp 388–397
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO99, pp 388–397. Springer
-
(1999)
Springer
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
15
-
-
84921608595
-
User authentication schemes for wireless sensor networks: A review
-
Kumari S, Khan MK, Atiquzzaman M (2015) User authentication schemes for wireless sensor networks: A review. Ad Hoc Netw 27:159–194. doi:10.1016/j.adhoc.2014.11.018
-
(2015)
Ad Hoc Netw
, vol.27
, pp. 159-194
-
-
Kumari, S.1
Khan, M.K.2
Atiquzzaman, M.3
-
16
-
-
79959430513
-
One for allcall for one: unifying standard differential power analysis attacks
-
Mangard S, Oswald E, Standaert FX (2011) One for allcall for one: unifying standard differential power analysis attacks. IET Inform Secur 5(2):100–110
-
(2011)
IET Inform Secur
, vol.5
, Issue.2
, pp. 100-110
-
-
Mangard, S.1
Oswald, E.2
Standaert, F.X.3
-
17
-
-
84944878354
-
-
Vanstone SA: Handbook of applied cryptography. CRC press
-
Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press
-
(1996)
Van Oorschot PC
-
-
Menezes, A.J.1
-
18
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE T Comput 51(5):541–552
-
(2002)
IEEE T Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
19
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distribu Sens Netw 2013
-
730831
-
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distribu Sens Netw 2013, Article ID 730831
-
(2013)
Article ID
-
-
Shi, W.1
Gong, P.2
-
20
-
-
85008348658
-
Cryptography and network security, principles and practices, 5th edition
-
Stallings W (2010) Cryptography and network security, principles and practices, 5th edition. Practice Hall
-
(2010)
Practice Hall
-
-
Stallings, W.1
-
21
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ (2013) On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers Ubiquit Comput 17(5):895– 905
-
(2013)
Pers Ubiquit Comput
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D.Z.1
Li, J.X.2
Feng, Z.Y.3
Cao, Z.F.4
Xu, G.Q.5
-
22
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, pp 600–606
-
Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, pp 600–606. IEEE
-
(2010)
IEEE
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
23
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1– 15
-
(2014)
Ad Hoc Netw
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
24
-
-
14844304757
-
Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64
-
Watro R, Kong D (2004) Cuti, S.f., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp 59–64. ACM
-
(2004)
ACM
-
-
Watro, R.1
Kong, D.2
-
25
-
-
84942364844
-
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile clientcserver networks
-
Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile clientcserver networks. Comput Electr Eng 45:316–327. doi:10.1016/j.compeleceng.2015.02.015
-
(2015)
Comput Electr Eng
, vol.45
, pp. 316-327
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
26
-
-
84963958402
-
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2)
-
Xu L, Wu F (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2), Article no. 179. doi:10.1007/s10916-014-0179-x
-
(2015)
Article no
, pp. 179
-
-
Xu, L.1
Wu, F.2
-
27
-
-
84919348312
-
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
-
Xu L, Wu F (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
-
(2015)
Secur Commun Netw
, vol.8
, Issue.2
, pp. 245-260
-
-
Xu, L.1
Wu, F.2
-
28
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316– 323
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
29
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
30
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distribu Sens Netw 2012
-
382810
-
Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distribu Sens Netw 2012, Article ID 382810
-
(2012)
Article ID
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
|