-
1
-
-
81455139721
-
Revisiting defenses against large-scale online password guessing attacks
-
Alsaleh, M., Mannan, M., Van Oorschot, P., Revisiting defenses against large-scale online password guessing attacks. IEEE Trans. Depend. Secur. Comput 9:1 (2012), 128–141.
-
(2012)
IEEE Trans. Depend. Secur. Comput
, vol.9
, Issue.1
, pp. 128-141
-
-
Alsaleh, M.1
Mannan, M.2
Van Oorschot, P.3
-
2
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8:1 (1990), 18–36.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen, T.-H., Shih, W.-K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32:5 (2010), 704–712.
-
(2010)
ETRI J.
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.-H.1
Shih, W.-K.2
-
4
-
-
84902296026
-
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi, Y., Lee, D., Kim, J., et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14:6 (2014), 10081–10106.
-
(2014)
Sensors
, vol.14
, Issue.6
, pp. 10081-10106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
-
5
-
-
85041450527
-
Who are you? A statistical approach to measuring user authenticity
-
D¨urmuth, M., Freeman, D., Biggio, B., Who are you? A statistical approach to measuring user authenticity. NDSS, 2016, 1–15.
-
(2016)
NDSS
, pp. 1-15
-
-
D¨urmuth, M.1
Freeman, D.2
Biggio, B.3
-
6
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K., A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35:5 (2012), 1646–1656.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
7
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8:3 (2009), 1086–1090.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
8
-
-
79960062320
-
An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
-
Fan, R., He, D., Pan, X., Ping, L., An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejinag Univ. Sci. C 12:7 (2011), 550–560.
-
(2011)
J. Zhejinag Univ. Sci. C
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
He, D.2
Pan, X.3
Ping, L.4
-
9
-
-
84922280033
-
Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting psarallel computing
-
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting psarallel computing. IEICE Trans. Commun. E98-B:1 (2015), 190–200.
-
(2015)
IEICE Trans. Commun.
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
10
-
-
84916883747
-
Threshold-value authentication architecture for wireless mesh networks
-
[Variable]
-
Guo, P., Wang, J., Li, B., Lee, S.A., Threshold-value authentication architecture for wireless mesh networks. [Variable] J. Internet Technol. 15:6 (2014), 929–936.
-
(2014)
J. Internet Technol.
, vol.15
, Issue.6
, pp. 929-936
-
-
Guo, P.1
Wang, J.2
Li, B.3
Lee, S.A.4
-
11
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He, D., et al. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 0 (2010), 1–11.
-
(2010)
Ad Hoc Sens. Wirel. Netw.
, pp. 1-11
-
-
He, D.1
-
12
-
-
84921481484
-
Authentication protocol for an ambient assisted living system
-
He, D., Zeadally, S., Authentication protocol for an ambient assisted living system. Commun. Mag. IEEE 53:1 (2015), 71–77.
-
(2015)
Commun. Mag. IEEE
, vol.53
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
13
-
-
84898048082
-
Enhanced three-factor security protocol for USB consumer storage devices
-
He, D., Kumar, N., Lee, J.-H., Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans. Consum. Electron. 60:1 (2014), 30–37.
-
(2014)
IEEE Trans. Consum. Electron.
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.-H.3
-
14
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321 (2015), 236–277.
-
(2015)
Inf. Sci.
, vol.321
, pp. 236-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
15
-
-
85043268105
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J., 2015, 10.1109/JSYST.2015.2428620.
-
(2015)
IEEE Syst. J.
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
16
-
-
85027949488
-
Robust biometrics-based authentication scheme for multi-server environment
-
He, D., Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9:3 (2015), 816–823.
-
(2015)
IEEE Syst. J.
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
17
-
-
84903511156
-
Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks
-
Hsieh, W.-B., Leu, J.-S., Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks. Wirel. Commun. Mob. Comput. 14:10 (2014), 995–1006.
-
(2014)
Wirel. Commun. Mob. Comput.
, vol.14
, Issue.10
, pp. 995-1006
-
-
Hsieh, W.-B.1
Leu, J.-S.2
-
18
-
-
84872473654
-
Security enhancement of robust user authentication framework for wireless sensor networks
-
Jiang, Q., Ma, Z., Ma, J., Li, G., Security enhancement of robust user authentication framework for wireless sensor networks. China Commun. 9:10 (2012), 103–111.
-
(2012)
China Commun.
, vol.9
, Issue.10
, pp. 103-111
-
-
Jiang, Q.1
Ma, Z.2
Ma, J.3
Li, G.4
-
19
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8:6 (2015), 1070–1081.
-
(2015)
Peer-to-Peer Netw. Appl.
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
20
-
-
84954436216
-
A privacy preserving three-actor authentication protocol for e-health clouds
-
Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-actor authentication protocol for e-health clouds. J. Supercomput., 2016, 10.1007/s11227-015-1610-x.
-
(2016)
J. Supercomput.
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
21
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83:4 (2016), 2085–2101.
-
(2016)
Nonlinear Dyn.
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
22
-
-
84976285479
-
On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services
-
Jiang, Q., Ma, J., Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J., 2016, 10.1109/JSYST.2016.2574719.
-
(2016)
IEEE Syst. J.
-
-
Jiang, Q.1
Ma, J.2
Wei, F.3
-
23
-
-
84988227377
-
Improvement of robust smart-card-based password authentication scheme
-
Jiang, Qi, Ma, Jianfeng, Li, Guangsong, Li, Xinghua, Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28:2 (2015), 383–393.
-
(2015)
Int. J. Commun. Syst.
, vol.28
, Issue.2
, pp. 383-393
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Li, X.4
-
24
-
-
77955495427
-
Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks
-
Khan, M.K., Alghathbar, K., Cryptanalysis and security improvement of two-factor user authentication in wireless sensor networks. Sensors, 2010, 2450–2459.
-
(2010)
Sensors
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
25
-
-
84939573910
-
Differential power analysis
-
Santa Barbara CA, USA
-
Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology, 1999, Santa Barbara, CA, USA, 388–397.
-
(1999)
Proc. Adv. Cryptology
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
26
-
-
79957718973
-
RUASN: a robust user authentication framework for wireless sensor networks
-
Kumar, P., et al. RUASN: a robust user authentication framework for wireless sensor networks. Sensors 11:5 (2011), 5020–5046.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 5020-5046
-
-
Kumar, P.1
-
27
-
-
84885231928
-
A strong authentication scheme with user privacy for wireless sensor networks
-
Kumar, P., et al. A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35:5 (2013), 889–899.
-
(2013)
ETRI J.
, vol.35
, Issue.5
, pp. 889-899
-
-
Kumar, P.1
-
28
-
-
84921608595
-
User authentication schemes for wireless sensor networks: a review
-
Kumari, S., Khan, M.K., Atiquzzaman, M., User authentication schemes for wireless sensor networks: a review. Ad Hoc Netw. 27 (2015), 159–194.
-
(2015)
Ad Hoc Netw.
, vol.27
, pp. 159-194
-
-
Kumari, S.1
Khan, M.K.2
Atiquzzaman, M.3
-
29
-
-
84904608123
-
EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X., EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25:8 (2014), 2053–2064.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.8
, pp. 2053-2064
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
30
-
-
84973579525
-
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
Li, H., Yang, Y., Luan, T., Liang, X., Zhou, L., Shen, X., Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secur. Comput., 2015, 10.1109/TDSC.2015.2406704.
-
(2015)
IEEE Trans. Dependable Secur. Comput.
-
-
Li, H.1
Yang, Y.2
Luan, T.3
Liang, X.4
Zhou, L.5
Shen, X.6
-
31
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attack
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attack. IEEE Trans. Comput. 51:5 (2002), 541–552.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
32
-
-
84908621929
-
A provably-secure ECC-based authentication scheme for wireless sensor networks
-
Nam, J., Kim, M., Paik, J., et al. A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14:11 (2014), 21023–21044.
-
(2014)
Sensors
, vol.14
, Issue.11
, pp. 21023-21044
-
-
Nam, J.1
Kim, M.2
Paik, J.3
-
33
-
-
84928677388
-
Efficient data integrity auditing for storage security in mobile health cloud
-
Ren, Y., Shen, J., Zheng, Y., Wang, J., Chao, H.-C., Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl., 2015, 10.1007/s12083-015-0346-y.
-
(2015)
Peer-to-Peer Netw. Appl.
-
-
Ren, Y.1
Shen, J.2
Zheng, Y.3
Wang, J.4
Chao, H.-C.5
-
34
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16:2 (2015), 317–323.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
35
-
-
84922323888
-
A novel routing protocol providing good transmission reliability in underwater sensor networks
-
Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16:1 (2015), 171–178.
-
(2015)
J. Internet Technol.
, vol.16
, Issue.1
, pp. 171-178
-
-
Shen, J.1
Tan, H.2
Wang, J.3
Wang, J.4
Lee, S.5
-
36
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Shi, W., Gong, P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., 2013.
-
(2013)
Int. J. Distrib. Sens. Netw.
-
-
Shi, W.1
Gong, P.2
-
37
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
Sun, D., Li, J., Feng, Z., Cao, Z., Xu, G., On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17:5 (2013), 895–905.
-
(2013)
Pers. Ubiquitous Comput.
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D.1
Li, J.2
Feng, Z.3
Cao, Z.4
Xu, G.5
-
38
-
-
84961312004
-
Two-factor mutual authentication with key agreement in wireless sensor networks
-
Vaidya, B., Makrakis, D., Mouftah, H., Two-factor mutual authentication with key agreement in wireless sensor networks. Secur. Commun. Netw., 2012, 10.1002/sec.517.
-
(2012)
Secur. Commun. Netw.
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.3
-
39
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Wang, D., Wang, P., Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 20 (2014), 1–15.
-
(2014)
Ad Hoc Netw.
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
40
-
-
84906774949
-
On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions
-
Wang, D., Wang, P., On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73 (2014), 41–57.
-
(2014)
Comput. Netw.
, vol.73
, pp. 41-57
-
-
Wang, D.1
Wang, P.2
-
41
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
-
Wang, D., He, D., Wang, P., Chu, C.-H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 12:4 (2015), 428–442, 10.1109/TDSC.2014.2355850.
-
(2015)
IEEE Trans. Dependable Secur. Comput.
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
-
42
-
-
84938203681
-
Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
-
Wang, D., Wang, N., Wang, P., Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321 (2015), 162–178.
-
(2015)
Inf. Sci.
, vol.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
43
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst., 2015, 10.1109/TPDS.2015.2401003.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
44
-
-
84906330795
-
Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
-
Xie, S., Wang, Y., Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78:1 (2014), 231–246.
-
(2014)
Wirel. Pers. Commun.
, vol.78
, Issue.1
, pp. 231-246
-
-
Xie, S.1
Wang, Y.2
-
45
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue, K., Ma, C., Hong, P., Ding, R., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36:1 (2013), 316–323.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
46
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh, H.-L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W., A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11:5 (2011), 4767–4779.
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.-L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
47
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
(Article ID 382810. 11 pages)
-
Yoo, S.-G., Park, K.-Y., Kim, J., A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw., 2012, 2012 (Article ID 382810. 11 pages).
-
(2012)
Int. J. Distrib. Sens. Netw.
, vol.2012
-
-
Yoo, S.-G.1
Park, K.-Y.2
Kim, J.3
|