-
1
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang, Q.; Ma, J.F.; Lu, X.; Tian, Y.L. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 2015, 8, 1070-1081.
-
(2015)
Peer-to-Peer Netw. Appl.
, vol.8
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.F.2
Lu, X.3
Tian, Y.L.4
-
2
-
-
84906774949
-
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
-
Wang, D.;Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput. Netw. 2014, 73, 41-57.
-
(2014)
Comput. Netw.
, vol.73
, pp. 41-57
-
-
Wang, D.1
Wang, P.2
-
3
-
-
84944073824
-
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
-
He, D.B.; Zeadally, S.; Xu, B.W.; Huang, X.Y. An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2681-2691.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, pp. 2681-2691
-
-
He, D.B.1
Zeadally, S.2
Xu, B.W.3
Huang, X.Y.4
-
4
-
-
84919909125
-
An efficient and robust rsa-based remote user authentication for telecare medical information systems
-
Giri, D.; Maitra, T.; Amin, R; Srivastava, P.D. An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 2015, 39, 1-9.
-
(2015)
J. Med. Syst.
, vol.39
, pp. 1-9
-
-
Giri, D.1
Maitra, T.2
Amin, R.3
Srivastava, P.D.4
-
5
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh, H.-L.; Chen, T.H.; Liu, P.C.; Kim, T.-H.; Wei, H.W. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 2011, 11, 4767-4779.
-
(2011)
Sensors
, vol.11
, pp. 4767-4779
-
-
Yeh, H.-L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.-H.4
Wei, H.W.5
-
6
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi, Y.; Lee, D.; Kim, J.; Jung, J.; Nam, J.; Won, D. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors. 2014, 14, 10081-10106.
-
(2014)
Sensors.
, vol.14
, pp. 10081-10106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
7
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
Washington, DC, USA, 25 October
-
Watro, R.; Kong, D.; Cuti, S.F.; Gardiner, C.; Lynn, C.; Kruus, P. Tinypk: Securing sensor networks with public key technology. In Proceedings of the 2nd ACM Workshopon Security of Ad Hoc and Sensor Networks (SASN'04),Washington, DC, USA, 25 October 2004; pp. 59-64.
-
(2004)
Proceedings of the 2nd ACM Workshopon Security of Ad Hoc and Sensor Networks (SASN'04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
8
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan, 5-7 June
-
Wong, K.H.M.; Zheng, Y.; Cao, J.; Wang, S. A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 5-7 June 2006.
-
(2006)
Proceedings of the 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
-
-
Wong, K.H.M.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
9
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086-1090.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, pp. 1086-1090
-
-
Das, M.L.1
-
10
-
-
84862773089
-
Improvement of Das's two-factor authentication protocol in wireless sensor networks
-
Nyang, D.; Lee, M.K. Improvement of Das's two-factor authentication protocol in wireless sensor networks. IACR Cryptol. ePrint Arch. 2009, 2009, 631.
-
(2009)
IACR Cryptol. ePrint Arch.
, vol.2009
, pp. 631
-
-
Nyang, D.1
Lee, M.K.2
-
11
-
-
78650442232
-
Enhancement of two-factor user authentication in wireless sensor networks
-
Darmstadt, Germany, 15-17 October
-
Huang, H.-F.; Chang, Y.F.; Liu, C.H. Enhancement of two-factor user authentication in wireless sensor networks. In Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 15-17 October 2010; pp. 27-30.
-
(2010)
Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 27-30
-
-
Huang, H.-F.1
Chang, Y.F.2
Liu, C.H.3
-
12
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
Niagara Falls, ON, Canada, 11-13 October
-
Vaidya, B.; Makrakis, D.; Mouftah, H.T. Improved two-factor user authentication in wireless sensor networks. In Proceedings of the IEEE 6th International Conference onWireless and Mobile Computing, Networking and Communications (WiMob), Niagara Falls, ON, Canada, 11-13 October 2010; pp. 600-606.
-
(2010)
Proceedings of the IEEE 6th International Conference onWireless and Mobile Computing, Networking and Communications (WiMob)
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
13
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor userauthentication in wireless sensor networks
-
Khan, M.K.; Alghathbar, K. Cryptanalysis and security improvements of two-factor userauthentication in wireless sensor networks. Sensors 2010, 10, 2450-2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
14
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D.J.; Gao, Y.; Chan, S.; Chen, C.; Bu, J.J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 2010, 10, 361-371.
-
(2010)
Ad Hoc Sens. Wirel. Netw.
, vol.10
, pp. 361-371
-
-
He, D.J.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.J.5
-
15
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Das, A.K.; Sharma, P.; Chatterjee, S.; Sing, J.K. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 1646-1656.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
16
-
-
84903599015
-
Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks"
-
Turkanović, M.; Hölbl, M. Notes on "a temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks". Wirel. Pers. Commun. 2013, 77, 907-922.
-
(2013)
Wirel. Pers. Commun.
, vol.77
, pp. 907-922
-
-
Turkanović, M.1
Hölbl, M.2
-
17
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Wang, D.; Wang, P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 2014, 20, 1-15.
-
(2014)
Ad Hoc Netw.
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
18
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
-
Li, C.-T.; Weng, C.-Y.; Lee, C.C. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 2013, 13, 9589-9603.
-
(2013)
Sensors
, vol.13
, pp. 9589-9603
-
-
Li, C.-T.1
Weng, C.-Y.2
Lee, C.C.3
-
19
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue, K.P.; Ma, C.S.; Hong, P.L.; Ding, R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 2013, 36, 316-323.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, pp. 316-323
-
-
Xue, K.P.1
Ma, C.S.2
Hong, P.L.3
Ding, R.4
-
20
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He, D.B.; Kumar, N.; Chilamkurti, N. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inform. Sci. 2015, 321, 263-277.
-
(2015)
Inform. Sci.
, vol.321
, pp. 263-277
-
-
He, D.B.1
Kumar, N.2
Chilamkurti, N.3
-
21
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
-
Turkanović, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 2014, 20, 96-112.
-
(2014)
Ad Hoc Netw.
, vol.20
, pp. 96-112
-
-
Turkanović, M.1
Brumen, B.2
Hölbl, M.3
-
22
-
-
84962198336
-
A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
-
Chang, C.C.; Le, H.D. A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 2016, 15, 357-366.
-
(2016)
IEEE Trans. Wirel. Commun.
, vol.15
, pp. 357-366
-
-
Chang, C.C.1
Le, H.D.2
-
23
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
-
Farash, M.S.; Turkanović, M.; Kumari, S.; Hölbl, M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 2016, 36, 152-176.
-
(2016)
Ad Hoc Netw.
, vol.36
, pp. 152-176
-
-
Farash, M.S.1
Turkanović, M.2
Kumari, S.3
Hölbl, M.4
-
24
-
-
84941221766
-
A secure lightweight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
-
Amin, R.; Biswas, G.P. A secure lightweight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 2015, 20, 1-23.
-
(2015)
Ad Hoc Netw.
, vol.20
, pp. 1-23
-
-
Amin, R.1
Biswas, G.P.2
-
25
-
-
38149061118
-
On the in distinguishability-based security model of key agreement protocols-simple cases
-
Cheng, Z.; Nistazakis, M.; Comley, R.; Vasiu, L. On the in distinguishability-based security model of key agreement protocols-simple cases. IACR Cryptology ePrint Arch. 2005, 2005, 129.
-
(2005)
IACR Cryptology ePrint Arch.
, vol.2005
, pp. 129
-
-
Cheng, Z.1
Nistazakis, M.2
Comley, R.3
Vasiu, L.4
-
26
-
-
0002886232
-
Key agreement protocols and their security analysis
-
Cirencester, UK, 17-19 December
-
Blake-Wilson, S.; Johnson, D.; Menezes, A. Key agreement protocols and their security analysis. In Proceedings of the Sixth IMA International Conference on Cryptography and Coding, Cirencester, UK, 17-19 December 1997.
-
(1997)
Proceedings of the Sixth IMA International Conference on Cryptography and Coding
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
27
-
-
84878356177
-
The science of guessing: Analyzing an anonymized corpus of 70 million passwords
-
San Francisco, CA, USA, 20-23 May
-
Bonneau, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proceedings of the 33th IEEE Symposium on Security and Privacy (S&P 2012), San Francisco, CA, USA, 20-23 May 2012; pp. 538-552.
-
(2012)
Proceedings of the 33th IEEE Symposium on Security and Privacy (S&P 2012)
, pp. 538-552
-
-
Bonneau, J.1
-
28
-
-
77953306210
-
Password strength: An empirical analysis
-
San Diego, CA, USA, 14-19 March
-
Dell'Amico, M.; Michiardi, P.; Roudier, Y. Password strength: An empirical analysis. In Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM 2010), San Diego, CA, USA, 14-19 March 2010; pp. 1-9.
-
(2010)
Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM 2010)
, pp. 1-9
-
-
Dell'Amico, M.1
Michiardi, P.2
Roudier, Y.3
-
29
-
-
0025386404
-
A logic of authentication
-
Burrow, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18-36.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
31
-
-
84973475288
-
-
(accessed on 6 June 2016)
-
AVISPA, AVISPAWeb Tool. Available online: http://www.avispa-project.org/web-interface/expert.php/ (accessed on 6 June 2016).
-
AVISPAWeb Tool.
-
-
-
32
-
-
0020720357
-
On the Security of Public Key Protocols
-
Dolev, D.; Yao, A.C. On the Security of Public Key Protocols. IEEE Trans. Inform. Theory 1983, 29, 198-208.
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
33
-
-
0347227352
-
-
U.S. Department of Commerce (accessed on 6 June 2016)
-
Advanced Encryption Standard, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce. Available online: http://csrc.nist.gov/publications/fips/fips197/fips-197. pdf (accessed on 6 June 2016).
-
FIPS PUB 197, National Institute of Standards and Technology (NIST)
-
-
-
34
-
-
84973461429
-
-
NIST (accessed on 6 June 2016)
-
SHA-3 Standardization. NIST. Available online: http://csrc.nist.gov/groups/ST/hash/sha-3/ sha-3-standardization.html (accessed on 6 June 2016).
-
SHA-3 Standardization.
-
-
|