-
1
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
S. Xie, Y. Wang. Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wireless Personal Communications, 2014, Vol. 78, No. 1, 231-246.
-
(2014)
Wireless Personal Communications
, vol.78
, Issue.1
, pp. 231-246
-
-
Xie, S.1
Wang, Y.2
-
2
-
-
84935865949
-
A secure tempo-ral-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
D. He, N. Kumar, N. Chilamkurti. A secure tempo-ral-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015, Vol. 321, 263-277.
-
(2015)
Information Sciences
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
3
-
-
84921481484
-
Authentication protocol for ambient assisted living system
-
D. He, S. Zeadally. Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 2015, Vol. 53, No. 1, 71-77.
-
(2015)
IEEE Communications Magazine
, vol.53
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
4
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
P. Guo, J. Wang, B. Li, S. Lee. A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 2014, Vol. 15, No. 6, 929-936.
-
(2014)
Journal of Internet Technology
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.4
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
M. L. Das. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 2009, Vol. 8, No. 3, 1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M. L.1
-
6
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
D. He, D. Wang. Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal, 2015, Vol. 9, No. 3, 816-823.
-
(2015)
IEEE Systems Journal
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
7
-
-
84898048082
-
Enhanced three-factor security protocol for mass consumer storage devices
-
D. He, N. Kumar, J.-H. Lee, R. S. Sherratt. Enhanced three-factor security protocol for mass consumer storage devices. IEEE Transactions on Consumer Electronics, 2014, Vol. 60, No. 1, 30-37.
-
(2014)
IEEE Transactions on Consumer Electronics
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
Sherratt, R. S.4
-
8
-
-
84862773089
-
Improvement of Das’s two-factor authentication protocol in wireless sensor networks
-
Accessed 28 February 2010
-
D. H. Nyang, M. K. Lee. Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Cryptology, ePrint archive, 2009. http://eprint.iacr.org/2009/631.pdf. Accessed 28 February 2010.
-
(2009)
Cryptology, ePrint archive
-
-
Nyang, D. H.1
Lee, M. K.2
-
9
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
T. H. Chen, W. K. Shih. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 2010, Vol. 32, No. 5, 704-712.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T. H.1
Shih, W. K.2
-
10
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
D. J. He, Y. Gao, S. Chan, C. Chen, J. Bu. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks, 2010, Vol. 10, No. 4, 361-371.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D. J.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
11
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
M. K. Khan, K. Alghathbar. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors, 2010, Vol. 10, No. 3, 2450-2459.
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M. K.1
Alghathbar, K.2
-
12
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
D. Z. Sun, J. X. Li, Z. Y. Feng, Z. F. Cao, G. Q. Xu. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing, 2013, Vol. 17, No. 5, 895-905.
-
(2013)
Personal and Ubiquitous Computing
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D. Z.1
Li, J. X.2
Feng, Z. Y.3
Cao, Z. F.4
Xu, G. Q.5
-
13
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag, Berlin, Germany, LNCS
-
M. Bellare, P. Rogaway. Entity authentication and key distribution. In: Proceedings of 13th Annual International Cryptology Conference: Advances in Cryptology-Crypto’93, 2013, Springer-Verlag, Berlin, Germany, LNCS 773, pp. 232-249.
-
(2013)
Proceedings of 13th Annual International Cryptology Conference: Advances in Cryptology-Crypto’93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
84901234489
-
An enhanced two-factor user authentication in wireless sensor networks
-
J. J. Yuan. An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems, 2014, Vol. 55, No. 1, 105-113.
-
(2014)
Telecommunication Systems
, vol.55
, Issue.1
, pp. 105-113
-
-
Yuan, J. J.1
-
16
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Springer-Verlag, Berlin, Germany, LNCS
-
Y. Dodis, L. Reyzin, A. Smith. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of International Europe Cryptology Conference: Advances in Cryptology-Eurocrypto’04, 2004, Springer-Verlag, Berlin, Germany, LNCS 3027, pp. 523-540.
-
(2004)
Proceedings of International Europe Cryptology Conference: Advances in Cryptology-Eurocrypto’04
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
17
-
-
34547519982
-
Privacy preserving multi-factor authentication with biometrics
-
A. Bhargav-Spantrel, A. C. Squicciarini, S. Modi, M. Young, E. Bertino, S. J. Elliott. Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, 2007, Vol. 15, No.5, 529-560.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.5
, pp. 529-560
-
-
Bhargav-Spantrel, A.1
Squicciarini, A. C.2
Modi, S.3
Young, M.4
Bertino, E.5
Elliott, S. J.6
-
18
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. S. Messerges, E. A. Dabbish, R. H. Sloan. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 2002, Vol. 51, No. 5, 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T. S.1
Dabbish, E. A.2
Sloan, R. H.3
-
19
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag, Berlin, Germany, LNCS 1666
-
P. Kocher, J. Jaffe, B. Jun. Differential power analysis. In: Proceedings of 19th Annual International Cryptology Conference: Advances in Cryptology-CRYPTO’99, 1999, Springer-Verlag, Berlin, Germany, LNCS 1666, pp. 388-397.
-
(1999)
Proceedings of 19th Annual International Cryptology Conference: Advances in Cryptology-CRYPTO’99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
20
-
-
84865393678
-
Robust fuzzy extractors and authenticated key agreement from close secrets
-
Y. Dodis, B. Kanukurthi, J. Katz, L. Reyzin, A. Smith. Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Transactions on Information Theory, 2012, Vol. 58, No. 9, 6207-6222.
-
(2012)
IEEE Transactions on Information Theory
, vol.58
, Issue.9
, pp. 6207-6222
-
-
Dodis, Y.1
Kanukurthi, B.2
Katz, J.3
Reyzin, L.4
Smith, A.5
|