-
1
-
-
18744393738
-
Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM
-
Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM conference on Computer and communications security, ACM, p 241–250
-
(2003)
p 241–250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
2
-
-
84962198336
-
-
A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks, IEEE Trans Wirel Commun
-
Chang CC, Le HD (2015) A provably secure, efficient and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun. doi:10.1109/TWC.2015.2473165
-
(2015)
Le HD
-
-
Chang, C.C.1
-
3
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. Etri J 32(5):704–712
-
(2010)
Etri J
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
4
-
-
84902296026
-
ecurity enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Choi Y, Lee D, Kim J, Jung J, Nam J, Won D (2014) ecurity enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6):10,081–10,106
-
(2014)
Sensors
, vol.14
, Issue.6
, pp. 10,081-10,106
-
-
Choi, Y.1
Lee, D.2
Kim, J.3
Jung, J.4
Nam, J.5
Won, D.6
-
5
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML (2009) Two-factor user authentication in wireless sensor networks. Wirel Commun IEEE Trans 8(3):1086–1090
-
(2009)
Wirel Commun IEEE Trans
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
6
-
-
79960062320
-
An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
-
Fan R, Dj He, Xz Pan (2011) An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J Zhejiang Univ Sci C 12(7):550–560
-
(2011)
J Zhejiang Univ Sci C
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
Dj, H.2
Xz, P.3
-
7
-
-
84906812799
-
A network architecture solution for efficient iot wsn backhauling: challenges and opportunities
-
Fantacci R, Pecorella T, Viti R, Carlini C (2014) A network architecture solution for efficient iot wsn backhauling: challenges and opportunities. IEEE Trans Wirel Commun 21(4):113–119
-
(2014)
IEEE Trans Wirel Commun
, vol.21
, Issue.4
, pp. 113-119
-
-
Fantacci, R.1
Pecorella, T.2
Viti, R.3
Carlini, C.4
-
8
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw
-
Farash MS, Turkanović M, Kumari S, Hölbl M (2015) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. doi:10.1016/j.adhoc.2015.05.014
-
(2015)
doi:10.1016/j.adhoc.2015.05.014
-
-
Farash, M.S.1
Turkanović, M.2
Kumari, S.3
Hölbl, M.4
-
9
-
-
84916883747
-
A variable threshold-value authentication architecture for wireless mesh networks
-
Guo P, Wang J, Geng XH, Kim CS, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929–935
-
(2014)
J Internet Technol
, vol.15
, Issue.6
, pp. 929-935
-
-
Guo, P.1
Wang, J.2
Geng, X.H.3
Kim, C.S.4
Kim, J.U.5
-
10
-
-
84922002292
-
Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Han W (2011) Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. IACR Cryptol ePrint Arch 2011:293
-
(2011)
IACR Cryptol ePrint Arch
, vol.2011
, pp. 293
-
-
Han, W.1
-
12
-
-
84988269687
-
A survey on encryption schemes in wireless sensor networks. In: Advanced Software Engineering and Its Applications (ASEA), 2014 7th International Conference on
-
Hayouni H, Hamdi M, Kim TH (2014) A survey on encryption schemes in wireless sensor networks. In: Advanced Software Engineering and Its Applications (ASEA), 2014 7th International Conference on, p 39–43
-
(2014)
p 39–43
-
-
Hayouni, H.1
Hamdi, M.2
Kim, T.H.3
-
13
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
-
(2010)
Ad Hoc Sens Wirel Netw
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
14
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
-
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49–60. doi:10.1007/s00530-013-0346-9
-
(2015)
Multimed Syst
, vol.21
, Issue.1
, pp. 49-60
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.C.4
Chilamkurti, N.5
Yeo, S.S.6
-
15
-
-
84903591701
-
A robust user authentication scheme using dynamic identity in wireless sensor networks
-
Hsieh WB, Leu JS (2014) A robust user authentication scheme using dynamic identity in wireless sensor networks. Wirel Pers Commun 77(2):979–989
-
(2014)
Wirel Pers Commun
, vol.77
, Issue.2
, pp. 979-989
-
-
Hsieh, W.B.1
Leu, J.S.2
-
16
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Khan MK, Alghathbar K (2010) Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3):2450–2459
-
(2010)
Sensors
, vol.10
, Issue.3
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
17
-
-
84939573910
-
Differential power analysis. In: Advances in Cryptology-CRYPTO 99, Springer
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Advances in Cryptology-CRYPTO 99, Springer, p 388–397
-
(1999)
p 388–397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
80052427734
-
Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
-
WiAd: IEEE
-
Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless Advanced (WiAd), IEEE, p 241–245
-
Wireless Advanced
, pp. 241-245
-
-
Kumar, P.1
-
19
-
-
84878597719
-
A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
-
Li X, Ma J, Wang W, Xiong Y, Zhang J (2013a) A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math Comput Model 58(1):85–95
-
(2013)
Math Comput Model
, vol.58
, Issue.1
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
20
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li X, Niu J, Khan MK, Liao J (2013b) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
21
-
-
84903637006
-
-
Liu Z, Wenger E, Gro β schä dl J (2014) Mote-ecc: energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol 8479, Springer International Publishing, p 361–379,10.1007/978-3-319-07536-5\_22
-
Liu Z, Wenger E, Gro β schä dl J (2014) Mote-ecc: energy-scalable elliptic curve cryptography for wireless-sensor-networks. In: Boureanu I, Owesarski P, Vaudenay S (eds) Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol 8479, Springer International Publishing, p 361–379, DOI 10.1007/978-3-319-07536-5\_22
-
-
-
-
22
-
-
84930763799
-
Survey on secure communication protocols for the internet of things
-
Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17–31
-
(2015)
Ad Hoc Netw
, vol.32
, pp. 17-31
-
-
Nguyen, K.T.1
Laurent, M.2
Oualha, N.3
-
23
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
-
(2015)
J Internet Technol
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
24
-
-
84877308219
-
A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 2013:730831. doi:10.1155/2013/730831
-
(2013)
Int J Distrib Sens Netw
, vol.2013
-
-
Shi, W.1
Gong, P.2
-
25
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
Turkanović M, Brumen B, Hölbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96–112
-
(2014)
Ad Hoc Netw
, vol.20
, pp. 96-112
-
-
Turkanović, M.1
Brumen, B.2
Hölbl, M.3
-
26
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, IEEE
-
Vaidya B, Makrakis D, Mouftah HT (2010) Improved two-factor user authentication in wireless sensor networks. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on, IEEE, p 600–606
-
(2010)
p 600–606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
27
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Wang D, Wang P (2014) Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw 20:1–15
-
(2014)
Ad Hoc Netw
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
28
-
-
14844304757
-
Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM
-
Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, ACM, p 59–64
-
(2004)
p 59–64
-
-
Watro, R.1
Kong, D.2
Sf, C.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
29
-
-
84923216048
-
An improved and provable self-certified digital signature scheme with message recovery
-
Wu F, Xu L (2015) An improved and provable self-certified digital signature scheme with message recovery. Int J Commun Syst 28(2):344–357
-
(2015)
Int J Commun Syst
, vol.28
, Issue.2
, pp. 344-357
-
-
Wu, F.1
Xu, L.2
-
30
-
-
84940853317
-
A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl
-
Wu F, Xu L, Kumari S, Li X (2015a) A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw Appl. doi:10.1007/s12083-015-0404-5
-
(2015)
doi:10.1007/s12083-015-0404-5
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
31
-
-
84942364844
-
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
-
Wu F, Xu L, Kumari S, Li X (2015b) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45:274–285
-
(2015)
Comput Electr Eng
, vol.45
, pp. 274-285
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
32
-
-
84936129205
-
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
-
Wu F, Xu L, Kumari S, Li X, Alelaiwi A (2015c) A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur Commun Netw 8(18):3847–3863
-
(2015)
Secur Commun Netw
, vol.8
, Issue.18
, pp. 3847-3863
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
Alelaiwi, A.5
-
33
-
-
84963958402
-
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
-
Xu L, Wu F (2015a) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39(2):1–9
-
(2015)
J Med Syst
, vol.39
, Issue.2
, pp. 1-9
-
-
Xu, L.1
Wu, F.2
-
34
-
-
84919348312
-
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
-
Xu L, Wu F (2015b) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245–260
-
(2015)
Secur Commun Netw
, vol.8
, Issue.2
, pp. 245-260
-
-
Xu, L.1
Wu, F.2
-
35
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
36
-
-
79957702363
-
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
-
Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW (2011) A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5):4767–4779
-
(2011)
Sensors
, vol.11
, Issue.5
, pp. 4767-4779
-
-
Yeh, H.L.1
Chen, T.H.2
Liu, P.C.3
Kim, T.H.4
Wei, H.W.5
-
37
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
Yoo SG, Park KY, Kim J (2012) A security-performance-balanced user authentication scheme for wireless sensor networks. Int J Distrib Sens Netw 2012:382810. doi:10.1155/2012/382810
-
(2012)
Int J Distrib Sens Netw
, vol.2012
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
|