-
1
-
-
2942686425
-
Sensor networks: evolution, opportunities and challenges
-
Chong CY, Kumar S. Sensor networks: evolution, opportunities and challenges. Proceedings of the IEEE 2003; 91(8):1247-1256.
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.8
, pp. 1247-1256
-
-
Chong, C.Y.1
Kumar, S.2
-
2
-
-
84961327386
-
-
IEEE Std 802.15.4-2006. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)
-
IEEE Std 802.15.4-2006. Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), 2006.
-
(2006)
-
-
-
3
-
-
84961332581
-
-
Communications Design Conference, Oct 2003; [June 2010].
-
Kinney P. ZigBee technology: wireless control that simply works. Communications Design Conference, Oct 2003; (http://www.zigbee.org/en/press_kits/latest/documents/white_papers/wp_zigbeetechwireless_final.pdf) [June 2010].
-
ZigBee technology: wireless control that simply works
-
-
Kinney, P.1
-
4
-
-
74049157270
-
A dynamic user authentication scheme for wireless sensor networks
-
June
-
Wong KH, Zheng Y, Cao J, Wang S. A dynamic user authentication scheme for wireless sensor networks. In Proc. of the IEEE SUTC'06, Vol. 1June. 2006; 318-327.
-
(2006)
Proc. of the IEEE SUTC'06
, vol.1
, pp. 318-327
-
-
Wong, K.H.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
6
-
-
77956388579
-
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
-
Sept-Oct
-
Vaidya B, Rodrigues JJ, Park JH. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems Sept-Oct2010; 23(9-10):1201-1222.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.9-10
, pp. 1201-1222
-
-
Vaidya, B.1
Rodrigues, J.J.2
Park, J.H.3
-
7
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8:1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
8
-
-
77955495427
-
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010; 10(3):2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
9
-
-
84961299318
-
-
Proc. of WiMob 2010, Niagara Falls, Canada, Oct
-
Vaidya B, Makrakis D, Mouftah H. Improved two-factor user authentication in wireless sensor networks. Proc. of WiMob 2010, Niagara Falls, Canada, Oct 2010.
-
(2010)
Improved two-factor user authentication in wireless sensor networks
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
10
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Oct.
-
Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal Oct.2010; 32(5):704-711.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-711
-
-
Chen, T.H.1
Shih, W.K.2
-
11
-
-
33744463927
-
An improved low communication cost user authentication scheme for mobile communication
-
March.
-
Lee CY, Lin CH, Chang CC. An improved low communication cost user authentication scheme for mobile communication. In Proc. of the IEEE AINA 2005, Vol. 2, March. 2005; 249-252.
-
(2005)
Proc. of the IEEE AINA 2005
, vol.2
, pp. 249-252
-
-
Lee, C.Y.1
Lin, C.H.2
Chang, C.C.3
-
12
-
-
67650737028
-
Efficient and secure password authentication schemes for low-power devices
-
Kim KW, Jeon JC, Yoo KY. Efficient and secure password authentication schemes for low-power devices. International Journal on Sensor Networks 2007; 2(1/2):77-81.
-
(2007)
International Journal on Sensor Networks
, vol.2
, Issue.1-2
, pp. 77-81
-
-
Kim, K.W.1
Jeon, J.C.2
Yoo, K.Y.3
-
14
-
-
14844304757
-
-
TinyPK: securing sensor networks with public key technology. Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks, October
-
Watro R, Kong D, Cuti S, Gardiner C, Lyn C, Kruus P. TinyPK: securing sensor networks with public key technology. Proc of the ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2004; 59-64.
-
(2004)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lyn, C.5
Kruus, P.6
-
19
-
-
68349130174
-
Attacking smart card systems: theory and practice
-
May
-
Markantonakis K, Tunstall M, Hancke GP, Askoxylakis I, Mayes KE. Attacking smart card systems: theory and practice. Information Security Technical Report May 2009; 14(2):46-56.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.2
, pp. 46-56
-
-
Markantonakis, K.1
Tunstall, M.2
Hancke, G.P.3
Askoxylakis, I.4
Mayes, K.E.5
-
20
-
-
33646834914
-
A new approach for random key pre-distribution in large-scale wireless sensor networks
-
Ren K, Zeng K, Lou W. A new approach for random key pre-distribution in large-scale wireless sensor networks. Journal on Wireless Communication and Mobile Computing 2006; 6(3):307-318.
-
(2006)
Journal on Wireless Communication and Mobile Computing
, vol.6
, Issue.3
, pp. 307-318
-
-
Ren, K.1
Zeng, K.2
Lou, W.3
|