-
1
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
-
Sep
-
M. Turkanovic, B. Brumen, and M. Holbl, "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion," Ad Hoc Netw., vol. 20, pp. 96-112, Sep. 2014
-
(2014)
Ad Hoc Netw
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Holbl, M.3
-
2
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Jun
-
K. H. M.Wong, Y. Zheng, J. Cao, and S.Wang, "A dynamic user authentication scheme for wireless sensor networks," in Proc. IEEE Int. Conf. Sens. Netw. Ubiq. Trustworthy Comput., Jun. 2006, vol. 1, pp. 244-251
-
(2006)
Proc. IEEE Int. Conf. Sens. Netw. Ubiq. Trustworthy Comput
, vol.1
, pp. 244-251
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
3
-
-
39349093196
-
An improved dynamic user authentication scheme for wireless sensor networks
-
Nov
-
H. R. Tseng, R. H. Jan, andW. Yang, "An improved dynamic user authentication scheme for wireless sensor networks," in Proc. IEEE Global Telecommun. Conf., Nov. 2007, pp. 986-990
-
(2007)
Proc. IEEE Global Telecommun. Conf
, pp. 986-990
-
-
Tseng, H.R.1
Jan, R.H.2
Yang, W.3
-
4
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar
-
M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
5
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Mar
-
M. K. Khan and K. Alghathbar, "Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks," Sensors, vol. 10, pp. 2450-2459, Mar. 2010
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
6
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Oct
-
T. H. Chen and W. K. Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI J., vol. 32, no. 5, pp. 704-712, Oct. 2010
-
(2010)
ETRI J
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
7
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc Sens. Wireless Netw., vol. 10, no. 4, pp. 361-371, 2010
-
(2010)
Ad Hoc Sens. Wireless Netw
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
8
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
Oct
-
B. Vaidya, D. Makrakis, and H. T. Mouftah, "Improved two-factor user authentication in wireless sensor networks," in Proc. IEEE 6th Int. Conf. Wireless Mobile Comput. Netw. Commun., Oct. 2010, pp. 600-606
-
(2010)
Proc. IEEE 6th Int. Conf. Wireless Mobile Comput. Netw. Commun
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
9
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Sep
-
A. K. Das, P. Sharma, S. Chatterjee, and J. K. Sing, "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks," J. Netw. Comput. Appl., vol. 35, no. 5, pp. 1646-1656, Sep. 2012
-
(2012)
J. Netw. Comput. Appl
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
10
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Jan
-
K. Xue, C. Ma, P. Hong, and R. Ding, "A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks," J. Netw. Comput. Appl., vol. 36, no. 1, pp. 316-323, Jan. 2013
-
(2013)
J. Netw. Comput. Appl
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
11
-
-
84880828581
-
An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks
-
Jul
-
C. T. Li, C. Y. Weng, and C. C. Lee, "An advanced temporal credentialbased security scheme with mutual authentication and key agreement for wireless sensor networks," Sensors, vol. 13, pp. 9589-9603, Jul. 2013
-
(2013)
Sensors
, vol.13
, pp. 9589-9603
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
-
12
-
-
84879297926
-
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
M. Turkanovic and M. Holbl, "An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks," Electron. Elect. Eng., vol. 19, no. 6, pp. 109-116, 2013
-
(2013)
Electron. Elect. Eng
, vol.19
, Issue.6
, pp. 109-116
-
-
Turkanovic, M.1
Holbl, M.2
-
13
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
May
-
H. L. Yeh, T. H Chen, P. C. Liu, T. H. Kim, and H. W. Wei, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol. 11, pp. 4767-4779, May 2011
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
14
-
-
84902128521
-
Privacy-preserving mobile roaming authentication with security proof in global mobility networks
-
Q. Xie, D. Hong, M. Bao, N. Dong, and D. S.Wong, "Privacy-preserving mobile roaming authentication with security proof in global mobility networks," Int. J. Distrib. Sens. Netw., vol. 2014, 7 pp., 2014, Article ID: 325734, doi: 10.1155/2014/325734
-
(2014)
Int. J. Distrib. Sens. Netw
, vol.2014
, pp. 7
-
-
Xie, Q.1
Hong, D.2
Bao, M.3
Dong, N.4
Wong, D.S.5
-
15
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
W. Shi and P. Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," Int. J. Distrib. Sens. Netw., vol. 2013, 7 pp., 2013, Article ID: 730831, doi: 10.1155/2013/730831
-
(2013)
Int. J. Distrib. Sens. Netw
, vol.2013
, pp. 7
-
-
Shi, W.1
Gong, P.2
-
16
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Jun
-
Y. S. Choi, D. Lee, J. Kim, J. Jung, J. Nam, and D. Won, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol. 14, no. 6, pp. 10081-10106, Jun. 2014
-
(2014)
Sensors
, vol.14
, Issue.6
, pp. 10081-10106
-
-
Choi, Y.S.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
17
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Jan
-
M. Abdalla, P. A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proc. Public Key Cryptogr., Jan. 2005, pp. 65-84
-
(2005)
Proc. Public Key Cryptogr
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.A.2
Pointcheval, D.3
-
18
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Aug
-
J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," in Proc. Crypto'03, Aug. 2003, pp. 110-125
-
(2003)
Proc. Crypto'03
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
19
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proc. 1st ACM Annu. Conf. Comput. Commun. Secur., 1993, vol. 773, pp. 62-73
-
(1993)
Proc. 1st ACM Annu. Conf. Comput. Commun. Secur
, vol.773
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
20
-
-
70349791260
-
A simple user authentication scheme for grid computing
-
R. Lu, Z. Cao, Z. Chai, and X. Liang, "A simple user authentication scheme for grid computing," Int. J. Netw. Secur., vol. 7, no. 2, pp. 202-206, 2008
-
(2008)
Int. J. Netw. Secur
, vol.7
, Issue.2
, pp. 202-206
-
-
Lu, R.1
Cao, Z.2
Chai, Z.3
Liang, X.4
|