-
1
-
-
84962198336
-
A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks
-
Chang CC, Le HD. A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Transactions on Wireless Communications 2016; 15(1): 357–366.
-
(2016)
IEEE Transactions on Wireless Communications
, vol.15
, Issue.1
, pp. 357-366
-
-
Chang, C.C.1
Le, H.D.2
-
2
-
-
84964246143
-
Anonymous Authentication for Wireless Body Area Networks With Provable Security
-
He D, Zeadally S, Kumar N, Lee JH. Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Systems Journal 2016. DOI: 10.1109/JSYST.2016.2544805.
-
(2016)
IEEE Systems Journal
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.H.4
-
3
-
-
84963682665
-
One-to-many Authentication for Access Control in Mobile Pay-TV Systems
-
He D, Kumar N, Shen H, Lee JH. One-to-many Authentication for Access Control in Mobile Pay-TV Systems. Science China-Information Sciences 2016; 59(5): 1–14.
-
(2016)
Science China-Information Sciences
, vol.59
, Issue.5
, pp. 1-14
-
-
He, D.1
Kumar, N.2
Shen, H.3
Lee, J.H.4
-
4
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
Wang D, He D, Wang P, Chu CH. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing 2015; 12(4): 428–442.
-
(2015)
IEEE Transactions on Dependable and Secure Computing
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.H.4
-
5
-
-
84859896093
-
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
-
Huyen NTT, Jo M, Nguyen TD, Huh EN. A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks. Security and Communication Networks 2012; 5(5): 485–495.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.5
, pp. 485-495
-
-
Huyen, N.T.T.1
Jo, M.2
Nguyen, T.D.3
Huh, E.N.4
-
6
-
-
66449127121
-
An efficient signal-range-based probabilistic key pre-distribution scheme in a wireless sensor network
-
Huyen NTT, Jo M, Guizani M, Huh EN. An efficient signal-range-based probabilistic key pre-distribution scheme in a wireless sensor network. IEEE Transactions on Vehicular Technology 2009; 58(5): 2482–2497.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.5
, pp. 2482-2497
-
-
Huyen, N.T.T.1
Jo, M.2
Guizani, M.3
Huh, E.N.4
-
7
-
-
84929837704
-
A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
-
Das AK. A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications 2015; 82(3): 1377–1404.
-
(2015)
Wireless Personal Communications
, vol.82
, Issue.3
, pp. 1377-1404
-
-
Das, A.K.1
-
8
-
-
84921852751
-
A secure and effective biometric-based user authentication scheme for wireless sensor net works using smart card and fuzzy extractor
-
Das AK. A secure and effective biometric-based user authentication scheme for wireless sensor net works using smart card and fuzzy extractor. International Journal of Communication Systems 2015. DOI: 10.1002/dac.2933.
-
(2015)
International Journal of Communication Systems
-
-
Das, A.K.1
-
9
-
-
84964350666
-
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
-
Odelu V, Das AK, Goswami A. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Transactions on Consumer Electronics 2016; 62(1): 30–38.
-
(2016)
IEEE Transactions on Consumer Electronics
, vol.62
, Issue.1
, pp. 30-38
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
10
-
-
84959386693
-
An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
-
Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X. An efficient multi-gateway based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Security and Communication Networks 2016; 9(13): 2070–2092.
-
(2016)
Security and Communication Networks
, vol.9
, Issue.13
, pp. 2070-2092
-
-
Das, A.K.1
Sutrala, A.K.2
Kumari, S.3
Odelu, V.4
Wazid, M.5
Li, X.6
-
11
-
-
84938898177
-
An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks
-
Das AK. An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks. International Journal of Communication Networks and Distributed Systems 2015; 15(1): 22–60.
-
(2015)
International Journal of Communication Networks and Distributed Systems
, vol.15
, Issue.1
, pp. 22-60
-
-
Das, A.K.1
-
12
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
-
Farash MS, Turkanovic M, Kumari S, Holbl M. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 2016; 36, Part 1: 152–176.
-
(2016)
Ad Hoc Networks
, vol.36, Part 1
, pp. 152-176
-
-
Farash, M.S.1
Turkanovic, M.2
Kumari, S.3
Holbl, M.4
-
13
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 2014; 8(6): 1070–1081.
-
(2014)
Peer-to-peer Networking and Applications
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
14
-
-
84903610217
-
An efficient ticket based authentication protocol with unlinkability for wireless access networks
-
Jiang Q, Ma J, Li G, Yang L. An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Personal Communications 2014; 77(2): 1489–1506.
-
(2014)
Wireless Personal Communications
, vol.77
, Issue.2
, pp. 1489-1506
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
16
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Jiang Q, Wei F, Fu S, Ma J, Li G, Alelaiwi A. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dynamics 2015; 83(4): 2085–2101.
-
(2015)
Nonlinear Dynamics
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
17
-
-
84921608595
-
User authentication schemes for wireless sensor networks: a review
-
Kumari S, Khan MK, Atiquzzaman M. User authentication schemes for wireless sensor networks: a review. Ad Hoc Networks 2015; 27: 159–194.
-
(2015)
Ad Hoc Networks
, vol.27
, pp. 159-194
-
-
Kumari, S.1
Khan, M.K.2
Atiquzzaman, M.3
-
18
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3): 1086–1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
19
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Das AK, Sharma P, Chatterjee S, Sing JK. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 2012; 35(5): 1646–1656.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
20
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5): 704–712.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
21
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc and Sensor Wireless Networks 2010; 10(4): 361–371.
-
(2010)
Ad Hoc and Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
22
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 2010; 10(3): 2450–2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
23
-
-
84879297926
-
An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Turkanovic M, Holbl M. An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Electronic and Electrical Engineering 2013; 19(6): 109–116.
-
(2013)
Electronic and Electrical Engineering
, vol.19
, Issue.6
, pp. 109-116
-
-
Turkanovic, M.1
Holbl, M.2
-
24
-
-
84880828581
-
An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks
-
Li CT, Weng CY, Lee CC. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks. Sensors 2013; 13(8): 9589–9603.
-
(2013)
Sensors
, vol.13
, Issue.8
, pp. 9589-9603
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
-
25
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue K, Ma C, Hong P, Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 2013; 36(1): 316–323.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
26
-
-
84953352636
-
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
-
Das AK. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-peer Networking and Applications 2016; 9(1): 223–244.
-
(2016)
Peer-to-peer Networking and Applications
, vol.9
, Issue.1
, pp. 223-244
-
-
Das, A.K.1
-
27
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications 2015; 8(6): 1070–1081.
-
(2015)
Peer-to-peer Networking and Applications
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
28
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
Turkanovic M, Brumen B, Holbl M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 2014; 20: 96–112.
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Holbl, M.3
-
30
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
In, Springer, Interlaken, Switzerland
-
Dodis Y, Reyzin L, Smith A. 2004. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-Eurocrypt 2004Springer: Interlaken, Switzerland; 523–540.
-
(2004)
Advances in Cryptology-Eurocrypt 2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
33
-
-
70349792182
-
An efficient biometric-based remote authentication scheme using smart cards
-
Li CT, Hwang MS. An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications 2010; 33: 1–5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
34
-
-
84939573910
-
Differential power analysis
-
In, Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B. Differential power analysis. In Proceedings of Advances in Cryptology - CRYPTO'99, LNCS: Santa Barbara, California, USA, vol. 1666, 1999; 388–397.
-
(1999)
Proceedings of Advances in Cryptology - CRYPTO'99, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
35
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5): 541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
36
-
-
84959036273
-
Enhancing side-channel analysis of binary-field multiplication with bit reliability
-
In, Springer International Publishing, San Francisco, CA, USA
-
Pessl P, Mangard S. 2016. Enhancing side-channel analysis of binary-field multiplication with bit reliability. In Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016Springer International Publishing: San Francisco, CA, USA; 255–270.
-
(2016)
Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016
, pp. 255-270
-
-
Pessl, P.1
Mangard, S.2
-
37
-
-
0038629682
-
Analysis of key exchange schemes and their use for building secure channels
-
In, Springer, Innsbruck, Austria
-
Canetti R, Krawczyk H. 2001. Analysis of key exchange schemes and their use for building secure channels. In Advances in Cryptology–Eurocrypt 2001 Springer: Innsbruck, Austria; 451–472.
-
(2001)
Advances in Cryptology–Eurocrypt 2001
, pp. 451-472
-
-
Canetti, R.1
Krawczyk, H.2
-
38
-
-
81855227196
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
-
Das AK. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011; 5(3): 145–151.
-
(2011)
IET Information Security
, vol.5
, Issue.3
, pp. 145-151
-
-
Das, A.K.1
-
39
-
-
84921344790
-
Effective key management in dynamic wireless sensor networks
-
Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security 2015; 10(2): 371–383.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.2
, pp. 371-383
-
-
Seo, S.H.1
Won, J.2
Sultana, S.3
Bertino, E.4
-
41
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
In, Les Diablerets, Switzerland
-
Abdalla M, Fouque P, Pointcheval D. Password-based authenticated key exchange in the three-party setting. In Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC'05): Les Diablerets, Switzerland, 2005; 65–84.
-
(2005)
Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC'05)
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
43
-
-
84877723487
-
-
[Accessed on September 2015]
-
AVISPA. AVISPA Web Tool, 2015. Http://www.avispa-project.org/web-interface/expert.php/. [Accessed on September 2015].
-
(2015)
AVISPA Web Tool
-
-
-
46
-
-
26444497860
-
-
In, 17th International Conference on Computer Aided Verification (CAV'05), Lecture Notes in Computer Science (LNCS), Springer-Verlag, University of Edinburgh, Scotland, UK
-
Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications. In 17th International Conference on Computer Aided Verification (CAV'05), Lecture Notes in Computer Science (LNCS), vol. 3576. Springer-Verlag: University of Edinburgh, Scotland, UK, 2005; 281–285.
-
(2005)
The AVISPA tool for the automated validation of internet security protocols and applications
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
-
47
-
-
84898048082
-
Enhanced three-factor security protocol for consumer USB mass storage devices
-
He D, Kumar N, Lee JH, Sherratt RS. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics 2014; 60(1): 30–37.
-
(2014)
IEEE Transactions on Consumer Electronics
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.H.3
Sherratt, R.S.4
|