-
1
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
M. Burmester, T. V. Le, B. D. Medeiros, and G. Tsudik, "Universally composable RFID identification and authentication protocols," ACM Transactions on Information and System Security (TIS-SEC), vol. 12, no. 4, pp. 21-33, 2009
-
(2009)
ACM Transactions on Information and System Security (TIS-SEC)
, vol.12
, Issue.4
, pp. 21-33
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
Tsudik, G.4
-
2
-
-
78449298894
-
An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks
-
C. C. Chang and H. C. Tsai, "An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communication, vol. 9, no. 11, pp. 3346-3353, 2010
-
(2010)
IEEE Transactions on Wireless Communication
, vol.9
, Issue.11
, pp. 3346-3353
-
-
Chang, C.C.1
Tsai, H.C.2
-
3
-
-
84866945970
-
Universally composable security analysis of Oauth v2.0
-
S. Chari, C. Jutla, and A. Roy, "Universally composable security analysis of Oauth v2.0," IACR Cryptology ePrint Archive, pp. 526, 2011
-
(2011)
IACR Cryptology ePrint Archive
, pp. 526
-
-
Chari, S.1
Jutla, C.2
Roy, A.3
-
4
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V.Leung, "Body area networks: A survey," Mobile Networks and Applications, vol. 16, no. 2, pp. 171-193, 2011
-
(2011)
Mobile Networks and Applications
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.5
-
5
-
-
38049061159
-
Completeness of the authentication test
-
Springer
-
S. F. Doghmi, J. D. Guttman, and F. J. Thayer, "Completeness of the authentication test," in The 12th European Symposium on Research in Computer Security (ESORICS 2007), LNCS 4734, pp. 106-121, Springer, 2007
-
(2007)
The 12th European Symposium on Research in Computer Security (ESORICS 2007), LNCS 4734
, pp. 106-121
-
-
Doghmi, S.F.1
Guttman, J.D.2
Thayer, F.J.3
-
7
-
-
84867027569
-
Anonymous identity authentication scheme in wireless roaming communication
-
Seoul, Korea
-
th International Conference on Computing Technology and Information Management (ICCM'12), vol. 1, pp.124-129, Seoul, Korea, 2012
-
(2012)
th International Conference on Computing Technology and Information Management (ICCM'12)
, vol.1
, pp. 124-129
-
-
Feng, T.1
Zhou, W.2
Li, X.3
-
8
-
-
84874226703
-
BodyCloud: Integration of cloud computing and body sensor networks
-
Taipei, Taiwan
-
G. Fortino, M. Pathan, and G. Fatta, "BodyCloud: Integration of cloud computing and body sensor networks," in 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (Cloud-Com), pp. 851-856, Taipei, Taiwan, 2012
-
(2012)
2012 IEEE 4th International Conference on Cloud Computing Technology and Science (Cloud-Com)
, pp. 851-856
-
-
Fortino, G.1
Pathan, M.2
Fatta, G.3
-
9
-
-
70349303077
-
Cryptographic protocol composition via the authentication tests
-
York, UK
-
J. D. Guttman, "Cryptographic protocol composition via the authentication tests," in The 12th International Conference on Foundations of Software Science and Computational Structures, vol. 5504, pp. 303-317, York, UK, 2009
-
(2009)
The 12th International Conference on Foundations of Software Science and Computational Structures
, vol.5504
, pp. 303-317
-
-
Guttman, J.D.1
-
10
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J. D. Guttman and F. J. Thayer, "Authentication tests and the structure of bundles," Theoretical Computer Science, vol. 283, no, 2, pp. 333-380, 2002
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
11
-
-
77953486931
-
Untraceable mobile node authentication in WSN
-
K. Han, K. Kim, and T. Shon, "Untraceable mobile node authentication in WSN," Sensors, vol. 10, no. 5, pp.4410-4429, 2010
-
(2010)
Sensors
, vol.10
, Issue.5
, pp. 4410-4429
-
-
Han, K.1
Kim, K.2
Shon, T.3
-
12
-
-
79951676054
-
Privacy-preserving universal authentication protocol for wireless communications
-
D. He, J. Bu, S. Chan, C. Chen, and M. Yin, "Privacy-preserving universal authentication protocol for wireless communications," IEEE Transactions on Wireless Communications, vol.10, no.2, pp.431-436, 2011
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.2
, pp. 431-436
-
-
He, D.1
Bu, J.2
Chan, S.3
Chen, C.4
Yin, M.5
-
13
-
-
84881388540
-
Strong roaming authentication technique for wireless and mobile networks
-
D. He, C. Chen, S. Chan, and J. Bu, "Strong roaming authentication technique for wireless and mobile networks," International Journal of Communication Systems, vol. 26, no. 8, pp. 1028-1037, 2013
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.8
, pp. 1028-1037
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
14
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
-
Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400-411, 2009
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
15
-
-
51249093755
-
Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks
-
St. Louis, MO
-
th International Conference on Information Processing in Sensor Networks, pp. 445-456, St. Louis, MO, 2008
-
(2008)
th International Conference on Information Processing in Sensor Networks
, pp. 445-456
-
-
Hyun, S.1
Ning, P.2
Liu, A.3
Du, W.4
-
17
-
-
84879299002
-
A privacy-preserving reauthentication scheme for mobile wireless sensor networks
-
S. Jiang, J. Zhang, J. Miao, and C. Zhou, "A privacy-preserving reauthentication scheme for mobile wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 913782, pp. 1-8, 2013
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
, pp. 1-8
-
-
Jiang, S.1
Zhang, J.2
Miao, J.3
Zhou, C.4
-
18
-
-
84881487384
-
MHIP: Effective key management for mobile heterogeneous sensor networks
-
D. Kar, R. Tatum, and K. Zejdlik, "MHIP: Effective key management for mobile heterogeneous sensor networks," International Journal of Network Security, vol. 15, no. 4, pp. 280-290, 2013
-
(2013)
International Journal of Network Security
, vol.15
, Issue.4
, pp. 280-290
-
-
Kar, D.1
Tatum, R.2
Zejdlik, K.3
-
20
-
-
46849100481
-
A scalable key management and clustering scheme for wireless ad-hoc and sensor networks
-
J. Li, B. Bhattacharjee, M. Yu, and R. Levy, "A scalable key management and clustering scheme for wireless ad-hoc and sensor networks," Future Generation Computer Systems, vol.24, no. 8, pp. 860-869, 2008
-
(2008)
Future Generation Computer Systems
, vol.24
, Issue.8
, pp. 860-869
-
-
Li, J.1
Bhattacharjee, B.2
Yu, M.3
Levy, R.4
-
21
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, 2010
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
22
-
-
79956062825
-
Authentication and key management in 3G-WLAN interworking
-
X. Li, X. Lu, J. Ma, Z. Zhu, L. Xu, and Y. Park, "Authentication and key management in 3G-WLAN interworking," Mobile Networks and Applications, vol. 16, no. 3, pp. 394-407, 2011
-
(2011)
Mobile Networks and Applications
, vol.16
, Issue.3
, pp. 394-407
-
-
Li, X.1
Lu, X.2
Ma, J.3
Zhu, Z.4
Xu, L.5
Park, Y.6
-
23
-
-
84877667727
-
A lightweight roaming authentication protocol for anonymous wireless communication
-
Anaheim, CA
-
X. Li, Y. Zhang, X. Liu, J. Cao, and Q. Zhao, "A lightweight roaming authentication protocol for anonymous wireless communication," in 2012 Global Communications Conference (GLOBECOM), pp.1029-1034, Anaheim, CA, 2012
-
(2012)
2012 Global Communications Conference (GLOBECOM)
, pp. 1029-1034
-
-
Li, X.1
Zhang, Y.2
Liu, X.3
Cao, J.4
Zhao, Q.5
-
24
-
-
80054815214
-
An integrated stimulation and punishment mechanism for thwarting packet drop in multihop wireless networks
-
M. E. Mahmoud and X. Shen, "An integrated stimulation and punishment mechanism for thwarting packet drop in multihop wireless networks," IEEE Transactions on Vehicular Technology, vol. 60, no.8, pp.3947-3962, 2011
-
(2011)
IEEE Transactions on Vehicular Technology
, vol.60
, Issue.8
, pp. 3947-3962
-
-
Mahmoud, M.E.1
Shen, X.2
-
25
-
-
84859190329
-
FESCIM: Fair, efficient, and secure cooperation incentive mechanism for multi-hop cellular networks
-
M. E.Mahmoud and X. Shen, "FESCIM: Fair, efficient, and secure cooperation incentive mechanism for multi-hop cellular networks," IEEE Transactions on Mobile Computing, vol. 11, no.5, pp.753-766, 2012
-
(2012)
IEEE Transactions on Mobile Computing
, vol.11
, Issue.5
, pp. 753-766
-
-
Mahmoud, M.E.1
Shen, X.2
-
26
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
Avignon, France
-
G. de Meulenaer, F. Gosset, F. X. Standaert, and O. Pereira, "On the energy cost of communication and cryptography in wireless sensor networks," in The 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB'08), pp. 580-585, Avignon, France, 2008
-
(2008)
The 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB'08)
, pp. 580-585
-
-
de Meulenaer, G.1
Gosset, F.2
Standaert, F.X.3
Pereira, O.4
-
27
-
-
41849094781
-
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
-
P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks," ACM Transactions on Sensor Networks, vol. 4, no. 1, pp. 1-35, 2008
-
(2008)
ACM Transactions on Sensor Networks
, vol.4
, Issue.1
, pp. 1-35
-
-
Ning, P.1
Liu, A.2
Du, W.3
-
28
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," ACM Wireless Network, vol. 8, no. 5, pp. 521-534, 2002
-
(2002)
ACM Wireless Network
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
29
-
-
77951758784
-
Authentication and key establishment in dynamic wireless sensor networks
-
Y. Qiu, J. Zhou, J. Baek, and J. Lopez, "Authentication and key establishment in dynamic wireless sensor networks," Sensor, vol. 10, no. 4, pp. 3718-3731, 2010
-
(2010)
Sensor
, vol.10
, Issue.4
, pp. 3718-3731
-
-
Qiu, Y.1
Zhou, J.2
Baek, J.3
Lopez, J.4
-
31
-
-
84991812412
-
'Universally composable security: A new paradigm for cryptographic protocols,'
-
C. Ran, "Universally composable security: A new paradigm for cryptographic protocols," Cryptology ePrint Archive, Report 2000/067, 2005
-
(2005)
Cryptology ePrint Archive, Report 2000/067
-
-
Ran, C.1
-
32
-
-
70349103341
-
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
-
Zurich, Switzerland
-
H. Tan, D. Ostry, J. Zic, and S. Jha, "A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks," in The Second ACM Conference on Wireless Network Security, pp. 245-252, Zurich, Switzerland, 2009
-
(2009)
The Second ACM Conference on Wireless Network Security
, pp. 245-252
-
-
Tan, H.1
Ostry, D.2
Zic, J.3
Jha, S.4
-
33
-
-
56749160373
-
A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks
-
Alexandria, VA
-
Z. Wan, K. Ren, and B. Preneel, "A secure privacypreserving roaming protocol based on hierarchical identity-based encryption for mobile networks," in The First ACM Conference on Wireless Network Security (ACM WiSec'08), pp. 62-67, Alexandria, VA, 2008
-
(2008)
The First ACM Conference on Wireless Network Security (ACM WiSec'08)
, pp. 62-67
-
-
Wan, Z.1
Ren, K.2
Preneel, B.3
-
34
-
-
84903885385
-
A regular expression matching approach to distributed wireless network security system
-
J. Wang, Y. Yu, and K. Zhou, "A regular expression matching approach to distributed wireless network security system," International Journal of Network Security, vol. 16, no. 5, pp. 382-388, 2014
-
(2014)
International Journal of Network Security
, vol.16
, Issue.5
, pp. 382-388
-
-
Wang, J.1
Yu, Y.2
Zhou, K.3
-
35
-
-
79953330601
-
Patrol detection for replica attacks on wireless sensor networks
-
L. Wang and Y. Shi, "Patrol detection for replica attacks on wireless sensor networks," Sensors, vol.11, no.3, pp. 2496-2504, 2011
-
(2011)
Sensors
, vol.11
, Issue.3
, pp. 2496-2504
-
-
Wang, L.1
Shi, Y.2
-
36
-
-
84893691459
-
One-pass key establishment protocol for wireless roaming with user anonymity
-
Y. Wang, D. S. Wong, and L. Huang, "One-pass key establishment protocol for wireless roaming with user anonymity," International Journal of Network Security, vol. 16, no. 2, pp. 129-142, 2014
-
(2014)
International Journal of Network Security
, vol.16
, Issue.2
, pp. 129-142
-
-
Wang, Y.1
Wong, D.S.2
Huang, L.3
-
37
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
Washington, DC
-
nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, Washington, DC, 2004
-
(2004)
nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
38
-
-
79959537385
-
Comments on an anonymous and selfverified mobile authentication with authenticated key agreement for large-scale wireless networks
-
G. Yang, "Comments on an anonymous and selfverified mobile authentication with authenticated key agreement for large-scale wireless networks," IEEE Transactions on Wireless Communication, vol. 10, no. 6, pp. 2015-2016, 2011
-
(2011)
IEEE Transactions on Wireless Communication
, vol.10
, Issue.6
, pp. 2015-2016
-
-
Yang, G.1
-
39
-
-
74549210063
-
Universal authenticated protocols for anonymous wireless communications
-
G. Yang, Q. Huang, D. Wong, and X. Deng, "Universal authenticated protocols for anonymous wireless communications," IEEE Transactions on Wireless Communications, vol.9, no.1, pp.168-174, 2010
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 168-174
-
-
Yang, G.1
Huang, Q.2
Wong, D.3
Deng, X.4
-
41
-
-
84859883917
-
Detecting node replication attacks in mobile sensor networks: theory and approaches
-
W. Zhu, J. Zhou, R. H. Deng, and F. Bao, "Detecting node replication attacks in mobile sensor networks: theory and approaches," Security and Communication Networks, vol. 5, no. 5, pp. 496-507, 2012
-
(2012)
Security and Communication Networks
, vol.5
, Issue.5
, pp. 496-507
-
-
Zhu, W.1
Zhou, J.2
Deng, R.H.3
Bao, F.4
|