-
1
-
-
78650891113
-
SNAIL: An IP-based wireless sensor network approach to the Internet of Things
-
Dec
-
S. Hong, et al., SNAIL: An IP-based wireless sensor network approach to the Internet of Things, '' IEEEWireless Commun, vol. 17, no. 6, pp. 34-42, Dec. 2010.
-
(2010)
IEEEWireless Commun
, vol.17
, Issue.6
, pp. 34-42
-
-
Hong, S.1
-
2
-
-
79955712919
-
Key management systems for sensor networks in the context of the Internet of Things
-
Mar
-
R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, Key management systems for sensor networks in the context of the Internet of Things, '? Comput. Elect. Eng, vol. 37, no. 2, pp. 147-159, Mar. 2011.
-
(2011)
Comput. Elect. Eng
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
3
-
-
85027927161
-
Security in the integration of lowpower wireless sensor networks with the internet: A survey
-
Jan
-
J. Granjal, E. Monteiro, and J. S. Silva, Security in the integration of lowpower Wireless Sensor Networks with the Internet: A survey, '' Ad Hoc Netw, vol. 24, pp. 264-287, Jan. 2015.
-
(2015)
Ad Hoc Netw
, vol.24
, pp. 264-287
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
4
-
-
84892614267
-
A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities
-
Dec
-
Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. McCann, and K. Leung, A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities, '' IEEE Wireless Commun, vol. 20, no. 6, pp. 91-98, Dec. 2013.
-
(2013)
IEEE Wireless Commun
, vol.20
, Issue.6
, pp. 91-98
-
-
Sheng, Z.1
Yang, S.2
Yu, Y.3
Vasilakos, A.4
McCann, J.5
Leung, K.6
-
5
-
-
85018471598
-
-
Group. Accessed on Jan. Online].Available
-
6LoWPANWorking Group. Accessed on Jan. 15, 2017. [Online].Available: http://tools.ietf.org/wg/6lowpan/
-
6LoWPANWorking
, vol.15
, pp. 2017
-
-
-
6
-
-
85018503573
-
-
Accessed on Jan. Online]. Available
-
ROLL Working Group. Accessed on Jan. 15, 2017. [Online]. Available: http://tools.ietf.org/wg/roll/
-
(2017)
ROLL Working Group
, vol.15
-
-
-
7
-
-
67649560482
-
Integrating wireless sensor networks and the Internet: A security analysis
-
R. Roman and J. Lopez, Integrating wireless sensor networks and the Internet: A security analysis, '' Internet Res, vol. 19, no. 2, pp. 246-259, 2009.
-
(2009)
Internet Res
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
-
8
-
-
84897727549
-
Enhancing secure access to sensor data with user privacy support
-
May
-
J. Astorga, E. Jacob, N. Toledo, and J. Unzilla, Enhancing secure access to sensor data with user privacy support, '' Comput. Netw, vol. 64, pp. 159-179, May 2014.
-
(2014)
Comput. Netw
, vol.64
, pp. 159-179
-
-
Astorga, J.1
Jacob, E.2
Toledo, N.3
Unzilla, J.4
-
9
-
-
84959857578
-
A hybrid security and compressive sensing-based sensor data gathering scheme
-
J. Qi, X. Hu, Y. Ma, and Y. Sun, A hybrid security and compressive sensing-based sensor data gathering scheme, '' IEEE Access, vol. 3, pp. 718-724, 2015.
-
(2015)
IEEE Access
, vol.3
, pp. 718-724
-
-
Qi, J.1
Hu, X.2
Ma, Y.3
Sun, Y.4
-
10
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing, '' IEICE Trans. Commun, vol. E98-B, no. 1, pp. 190-200, 2015.
-
(2015)
IEICE Trans. Commun, Vol. E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
11
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
to be published
-
Z. Fu, F. Huang, X. Sun, A. V. Vasilakos, and C.-N. Yang, Enabling semantic search based on conceptual graphs over encrypted outsourced data, '' IEEE Trans. Serv. Comput., to be published, doi: 10.1109/TSC.2016.2622697.
-
IEEE Trans. Serv. Comput
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.V.4
Yang, C.-N.5
-
12
-
-
84940510005
-
Engineering searchable encryption of mobile cloud networks: When QoE meets qop
-
Aug
-
H. Li, D. Liu, Y. Dai, and T. H. Luan, Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, '' IEEE Wireless Commun, vol. 22, no. 4, pp. 74-80, Aug. 2015.
-
(2015)
IEEE Wireless Commun
, vol.22
, Issue.4
, pp. 74-80
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
-
13
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
to be published
-
D. He, S. Zeadally, N. Kumar, and J.-H. Lee, Anonymous authentication for wireless body area networks with provable security, '' IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2544805.
-
IEEE Syst. J
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.-H.4
-
14
-
-
84921481484
-
Authentication protocol for an ambient assisted living system
-
Jan
-
D. He and S. Zeadally, Authentication protocol for an ambient assisted living system, '' IEEE Commun. Mag, vol. 35, no. 1, pp. 71-77, Jan. 2015.
-
(2015)
IEEE Commun. Mag
, vol.35
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
15
-
-
84930763799
-
Survey on secure communication protocols for the Internet of Things
-
Sep
-
K. T. Nguyen, M. Laurent, and N. Oualha, Survey on secure communication protocols for the Internet of Things, '' Ad Hoc Netw, vol. 32, pp. 17-31, Sep. 2015.
-
(2015)
Ad Hoc Netw
, vol.32
, pp. 17-31
-
-
Nguyen, K.T.1
Laurent, M.2
Oualha, N.3
-
16
-
-
80052447165
-
Securing communication in 6LoWPAN with compressed IPsec
-
Jun
-
S. Raza, S. Duquennoy, A. Chung, D. Yazar, T. Voigt, and U. Roedig, Securing communication in 6LoWPAN with compressed IPsec, '' in Proc. 7th Int. Conf. DCOSS, Jun. 2011, pp. 1-8.
-
(2011)
Proc. 7th Int. Conf. DCOSS
, pp. 1-8
-
-
Raza, S.1
Duquennoy, S.2
Chung, A.3
Yazar, D.4
Voigt, T.5
Roedig, U.6
-
17
-
-
84930753105
-
Establishment of ECC-based initial secrecy usable for IKE implementation
-
London, U.K. Jul
-
S. Ray and G. Biswas, Establishment of ECC-based initial secrecy usable for IKE implementation, '' in Proc. World Congr. Eng. (WCE), vol. 1. London, U.K., Jul. 2012, pp. 1-6.
-
(2012)
Proc. World Congr. Eng. (WCE
, vol.1
, pp. 1-6
-
-
Ray, S.1
Biswas, G.2
-
18
-
-
84921608595
-
User authentication schemes for wireless sensor networks: A review
-
Apr
-
S. Kumari, M. K. Khan, and M. Atiquzzaman, User authentication schemes for wireless sensor networks: A review, '' Ad Hoc Netw, vol. 27, pp. 159-194, Apr. 2015.
-
(2015)
Ad Hoc Netw
, vol.27
, pp. 159-194
-
-
Kumari, S.1
Khan, M.K.2
Atiquzzaman, M.3
-
19
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Nov
-
Q. Jiang, J. Ma, X. Lu, and Y. Tian, An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks, '' Peer-Peer Netw. Appl, vol. 8, no. 6, pp. 1070-1081, Nov. 2014.
-
(2014)
Peer-Peer Netw. Appl
, vol.8
, Issue.6
, pp. 1070-1081
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
20
-
-
84935865949
-
A secure temporal-credentialbased mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
Nov
-
D. He, N. Kumar, and N. Chilamkurti, A secure temporal-credentialbased mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, '' Inf. Sci, vol. 321, pp. 263-277, Nov. 2015.
-
(2015)
Inf. Sci
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
21
-
-
84930202100
-
Cost-effective scalable and anonymous certificateless remote authentication protocol
-
Dec
-
H. Xiong, Cost-effective scalable and anonymous certificateless remote authentication protocol, '' IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2327-2339, Dec. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.12
, pp. 2327-2339
-
-
Xiong, H.1
-
22
-
-
84930216224
-
Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
-
Jul
-
H. Xiong and Z. Qin, Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks, '? IEEE Trans. Inf. Forensics Security, vol. 10, no. 7, pp. 1442-1455, Jul. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.7
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.2
-
23
-
-
84947804555
-
Enhanced secure sensor association and key management in wireless body area networks
-
Oct
-
J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, Enhanced secure sensor association and key management in wireless body area networks, '? J. Commun. Netw, vol. 17, no. 5, pp. 453-462, Oct. 2015.
-
(2015)
J. Commun. Netw
, vol.17
, Issue.5
, pp. 453-462
-
-
Shen, J.1
Tan, H.2
Moh, S.3
Chung, I.4
Liu, Q.5
Sun, X.6
-
24
-
-
84883394343
-
Practical secure communication for integrating wireless sensor networks into the Internet of Things
-
Oct
-
F. Li and P. Xiong, Practical secure communication for integrating wireless sensor networks into the Internet of Things, '' IEEE Sensors J, vol. 13, no. 10, pp. 3677-3684, Oct. 2013.
-
(2013)
IEEE Sensors J
, vol.13
, Issue.10
, pp. 3677-3684
-
-
Li, F.1
Xiong, P.2
-
25
-
-
84863560791
-
Ladon1: End-To-end authorisation support for resource-deprived environments
-
Jun
-
J. Astorga, E. Jacob, M. Huarte, and M. Higuero, Ladon1: End-To-end authorisation support for resource-deprived environments, '' IET Inf. Secur, vol. 6, no. 2, pp. 93-101, Jun. 2012.
-
(2012)
IET Inf. Secur
, vol.6
, Issue.2
, pp. 93-101
-
-
Astorga, J.1
Jacob, E.2
Huarte, M.3
Higuero, M.4
-
26
-
-
84988227377
-
Improvement of robust smart-cardbased password authentication scheme
-
Jan
-
Q. Jiang, J. Ma, G. Li, and X. Li, Improvement of robust smart-cardbased password authentication scheme, '' Int. J. Commun. Syst, vol. 28, no. 2, pp. 383-393, Jan. 2015.
-
(2015)
Int. J. Commun. Syst
, vol.28
, Issue.2
, pp. 383-393
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Li, X.4
-
27
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Mar
-
M. L. Das, Two-factor user authentication in wireless sensor networks, '? IEEE Trans. Wireless Commun, vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
28
-
-
84971016485
-
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
-
Oct
-
S. Kumari, et al., A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps, '' Future Generat. Comput. Syst, vol. 63, pp. 56-75, Oct. 2016.
-
(2016)
Future Generat. Comput. Syst
, vol.63
, pp. 56-75
-
-
Kumari, S.1
-
29
-
-
85008263167
-
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
-
Dec
-
Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, '' J. Netw. Comput. Appl, vol. 76, pp. 37-48, Dec. 2016.
-
(2016)
J. Netw. Comput. Appl
, vol.76
, pp. 37-48
-
-
Jiang, Q.1
Ma, J.2
Wei, F.3
Tian, Y.4
Shen, J.5
Yang, Y.6
-
30
-
-
84992451663
-
A privacyaware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
-
Q. Jiang, N. Kumar, J. Ma, J. Shen, D. He, and N. Chilamkurti, A privacyaware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks, '' Int. J. Netw. Manage., 2016, doi: 10.1002/nem.1937.
-
(2016)
Int. J. Netw. Manage
-
-
Jiang, Q.1
Kumar, N.2
Ma, J.3
Shen, J.4
He, D.5
Chilamkurti, N.6
-
31
-
-
84997014499
-
Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks
-
F. Wei, J. Ma, Q. Jiang, J. Shen, and C. Ma, Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks, '' Inf. Technol. Control, vol. 45, no. 1, pp. 62-70, 2016.
-
(2016)
Inf. Technol. Control
, vol.45
, Issue.1
, pp. 62-70
-
-
Wei, F.1
Ma, J.2
Jiang, Q.3
Shen, J.4
Ma, C.5
-
32
-
-
84901188390
-
Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
-
Sep
-
M. Turkanovic, B. Brumen, and M. Hölbl, Anovel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion, '' Ad Hoc Netw, vol. 20, pp. 96-112, Sep. 2014.
-
(2014)
Ad Hoc Netw
, vol.20
, pp. 96-112
-
-
Turkanovic, M.1
Brumen, B.2
Hölbl, M.3
-
33
-
-
84948714609
-
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
-
Jan
-
R. Amin and G. P. Biswas, A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks, '' Ad Hoc Netw, vol. 36, pp. 58-80, Jan. 2016.
-
(2016)
Ad Hoc Netw
, vol.36
, pp. 58-80
-
-
Amin, R.1
Biswas, G.P.2
-
34
-
-
84948712087
-
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
-
Jan
-
M. S. Farash, M. Turkanovic, M. Kumari, and S. Hölb, An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment, '' Ad Hoc Netw, vol. 36, pp. 152-176, Jan. 2016.
-
(2016)
Ad Hoc Netw
, vol.36
, pp. 152-176
-
-
Farash, M.S.1
Turkanovic, M.2
Kumari, M.3
Hölb, S.4
-
35
-
-
84962198336
-
A provably secure efficient and fiexible authentication scheme for ad hoc wireless sensor networks
-
Jan
-
C.-C. Chang and H. D. Le, A provably secure, efficient, and fiexible authentication scheme for ad hoc wireless sensor networks, '' IEEE Trans. Wireless Commun, vol. 15, no. 1, pp. 357-366, Jan. 2016.
-
(2016)
IEEE Trans. Wireless Commun
, vol.15
, Issue.1
, pp. 357-366
-
-
Chang, C.-C.1
Le, H.D.2
-
36
-
-
84973478502
-
An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks
-
Art. no. 837
-
Y. Lu, L. Li, H. Peng, and Y. Yang, An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks, '' Sensors, vol. 16, no. 6, 2016, Art. no. 837.
-
(2016)
Sensors
, vol.16
, Issue.6
-
-
Lu, Y.1
Li, L.2
Peng, H.3
Yang, Y.4
-
37
-
-
85009936481
-
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
-
Online]. Available
-
F. Wu, et al., An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment, '? J. Netw. Comput. Appl., 2016. [Online]. Available: http://dx.doi.org/10.1016/j.jnca.2016.12.008
-
(2016)
J. Netw. Comput. Appl
-
-
Wu, F.1
-
38
-
-
84983380948
-
Provably secure user authentication and key agreement scheme for wireless sensor networks
-
Nov
-
A. K. Das, et al., Provably secure user authentication and key agreement scheme for wireless sensor networks, '' Secur. Commun. Netw, vol. 9, no. 16, pp. 3670-3687, Nov. 2016.
-
(2016)
Secur. Commun. Netw
, vol.9
, Issue.16
, pp. 3670-3687
-
-
Das, A.K.1
-
39
-
-
84979462212
-
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
-
Jun
-
R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan, L. Leng, and N. Kumar, Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks, '' Comput. Netw, vol. 101, pp. 42-62, Jun. 2016.
-
(2016)
Comput. Netw
, vol.101
, pp. 42-62
-
-
Amin, R.1
Islam, S.H.2
Biswas, G.P.3
Khan, M.K.4
Leng, L.5
Kumar, N.6
-
40
-
-
85027949488
-
Robust biometrics-based authentication scheme for multiserver environment
-
Sep
-
D. He and D. Wang, Robust biometrics-based authentication scheme for multiserver environment, '' IEEE Syst. J, vol. 9, no. 3, pp. 816-823, Sep. 2015.
-
(2015)
IEEE Syst. J
, vol.9
, Issue.3
, pp. 816-823
-
-
He, D.1
Wang, D.2
-
41
-
-
84908157951
-
Applying biometrics to design threefactor remote user authentication scheme with key agreement
-
Oct
-
X. Li, J. Niu, Z. Wang, and C. Chen, Applying biometrics to design threefactor remote user authentication scheme with key agreement, '' Secur. Commun. Netw, vol. 7, no. 10, pp. 1488-1497, Oct. 2014.
-
(2014)
Secur. Commun. Netw
, vol.7
, Issue.10
, pp. 1488-1497
-
-
Li, X.1
Niu, J.2
Wang, Z.3
Chen, C.4
-
42
-
-
84958124876
-
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
-
Mar
-
Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy, '' Nonlinear Dyn, vol. 83, no. 4, pp. 2085-2101, Mar. 2016.
-
(2016)
Nonlinear Dyn
, vol.83
, Issue.4
, pp. 2085-2101
-
-
Jiang, Q.1
Wei, F.2
Fu, S.3
Ma, J.4
Li, G.5
Alelaiwi, A.6
-
43
-
-
84954436216
-
A privacy preserving three-factor authentication protocol for e-health clouds
-
Oct
-
Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, A privacy preserving three-factor authentication protocol for e-health clouds, '' J. Supercomput, vol. 72, no. 10, pp. 3826-3849, Oct. 2016.
-
(2016)
J. Supercomput
, vol.72
, Issue.10
, pp. 3826-3849
-
-
Jiang, Q.1
Khan, M.K.2
Lu, X.3
Ma, J.4
He, D.5
-
44
-
-
84976285479
-
On the security of a privacy-Aware authentication scheme for distributed mobile cloud computing services
-
to be published
-
Q. Jiang, J. Ma, and F. Wei, On the security of a privacy-Aware authentication scheme for distributed mobile cloud computing services, '' IEEE Syst. J., to be published, doi: 10.1109/JSYST.2016.2574719.
-
IEEE Syst. J
-
-
Jiang, Q.1
Ma, J.2
Wei, F.3
-
45
-
-
84953352636
-
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
-
Jan
-
A. K. Das, A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, '' Peer-Peer Netw. Appl, vol. 9, no. 1, pp. 223-244, Jan. 2014.
-
(2014)
Peer-Peer Netw. Appl
, vol.9
, Issue.1
, pp. 223-244
-
-
Das, A.K.1
-
46
-
-
84921852751
-
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
-
Jan
-
A. K. Das, A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor, '? Int. J. Commun. Syst, vol. 30, no. 1, p. e2933, Jan. 2017, doi: 10.1002/dac.2933.
-
(2017)
Int. J. Commun. Syst
, vol.30
, Issue.1
, pp. e2933
-
-
Das, A.K.1
-
47
-
-
84929837704
-
A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks
-
Jun
-
A. K. Das, A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks, '? Wireless Pers. Commun, vol. 82, no. 3, pp. 1377-1404, Jun. 2015.
-
(2015)
Wireless Pers. Commun
, vol.82
, Issue.3
, pp. 1377-1404
-
-
Das, A.K.1
-
48
-
-
84982796257
-
An improved and provably secure three-factor user authentication scheme for wireless sensor networks
-
F. Wu, L. Xu, S. Kumari, and X. Li, An improved and provably secure three-factor user authentication scheme for wireless sensor networks, '? Peer-Peer Netw. Appl., 2016, doi: 10.1007/s12083-016-0485-9.
-
(2016)
Peer-Peer Netw. Appl
-
-
Wu, F.1
Xu, L.2
Kumari, S.3
Li, X.4
-
49
-
-
84923405290
-
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
-
Oct
-
X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, '' Secur. Commun. Netw, vol. 9, no. 15, pp. 2643-2655, Oct. 2016.
-
(2016)
Secur. Commun. Netw
, vol.9
, Issue.15
, pp. 2643-2655
-
-
Li, X.1
Niu, J.2
Kumari, S.3
Liao, J.4
Liang, W.5
Khan, M.K.6
-
50
-
-
84988660486
-
A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks
-
A. K. Das, A. K. Sutrala, V. Odelu, and A. Goswami, A secure smartcardbased anonymous user authentication scheme for healthcare applications using wireless medical sensor networks, '' Wireless Pers. Commun., 2016, doi: 10.1007/s11277-016-3718-6.
-
(2016)
Wireless Pers. Commun
-
-
Das, A.K.1
Sutrala, A.K.2
Odelu, V.3
Goswami, A.4
-
51
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Jun
-
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, '' in Proc. IEEE Comput. Soc. Found. (CSFW), Jun. 2001, pp. 82-96.
-
(2001)
Proc. IEEE Comput. Soc. Found. (CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
52
-
-
84979822620
-
Protection of privacy in biometric data
-
I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, and J. Yearwood, Protection of privacy in biometric data, '' IEEE Access, vol. 4, pp. 880-892, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 880-892
-
-
Natgunanathan, I.1
Mehmood, A.2
Xiang, Y.3
Beliakov, G.4
Yearwood, J.5
-
53
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, '' in Proc. EUROCRYPT, 2004, pp. 523-540.
-
(2004)
Proc. EUROCRYPT
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
55
-
-
12344259813
-
BioHashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Apr
-
A. T. B. Jin, D. N. C. Ling, and A. Goh, BioHashing: Two factor authentication featuring fingerprint data and tokenised random number, '? Pattern Recognit, vol. 37, no. 11, pp. 2245-2255, Apr. 2004.
-
(2004)
Pattern Recognit
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
56
-
-
33750533142
-
An improved BioHashing for human authentication
-
Mar
-
R. Lumini and L. Nanni, An improved BioHashing for human authentication, '? Pattern Recognit, vol. 40, no. 3, pp. 1057-1065, Mar. 2007.
-
(2007)
Pattern Recognit
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, R.1
Nanni, L.2
-
57
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
Cambridge, MA, USA, Tech. Rep
-
M. O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, '' MIT Lab. Comput. Sci., Cambridge, MA, USA, Tech. Rep., 1979.
-
(1979)
MIT Lab. Comput. Sci
-
-
Rabin, M.O.1
-
58
-
-
84883234825
-
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-Traceability for low-end devices
-
Oct
-
H.-Y. Chien, Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-Traceability for low-end devices, '' Comput. Netw, vol. 57, no. 14, pp. 2705-2717, Oct. 2013.
-
(2013)
Comput. Netw
, vol.57
, Issue.14
, pp. 2705-2717
-
-
Chien, H.-Y.1
-
59
-
-
84975275069
-
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
-
Jul./Aug
-
D. Wang, D. He, P. Wang, and C.-H. Chu, Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment, '' IEEE Trans. Depend. Sec. Comput, vol. 12, no. 4, pp. 428-442, Jul./Aug. 2015.
-
(2015)
IEEE Trans. Depend. Sec. Comput
, vol.12
, Issue.4
, pp. 428-442
-
-
Wang, D.1
He, D.2
Wang, P.3
Chu, C.-H.4
-
60
-
-
85038117533
-
Two birds with one stone: Two-factor authentication with security beyond conventional bound
-
to be published
-
D. Wang and P. Wang, Two birds with one stone: Two-factor authentication with security beyond conventional bound, '' IEEE Trans. Depend. Sec. Comput., to be published, doi: 10.1109/TDSC.2016.2605087.
-
IEEE Trans. Depend. Sec. Comput
-
-
Wang, D.1
Wang, P.2
-
61
-
-
84979688615
-
The request for better measurement: A comparative evaluation of two-factor authentication schemes
-
May
-
D. Wang, Q. Gu, H. Cheng, and P. Wang, The request for better measurement: A comparative evaluation of two-factor authentication schemes, '? in Proc. 11th ACM Asia Conf. Comput. Commun. Secur., May 2016, pp. 475-486.
-
(2016)
Proc. 11th ACM Asia Conf. Comput. Commun. Secur
, pp. 475-486
-
-
Wang, D.1
Gu, Q.2
Cheng, H.3
Wang, P.4
-
62
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, CA, USA Aug
-
P. C. Kocher, J. Jaffe, and B. Jun, Differential power analysis, '' in Proc. Adv. Cryptol., Santa Barbara, CA, USA, Aug. 1999, pp. 388-397.
-
(1999)
Proc. Adv. Cryptol
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
63
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
May
-
T. S. Messerges, E. A. Dabbish, and R. H. Sloan, Examining smart-card security under the threat of power analysis attacks, '' IEEE Trans. Comput, vol. 51, no. 5, pp. 541-552, May 2002.
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
64
-
-
84945181077
-
Security of the J-PAKE password-Authenticated key exchange protocol
-
May
-
M. Abdalla, F. Benhamouda, and P. MacKenzie, Security of the J-PAKE password-Authenticated key exchange protocol, '' in Proc. IEEE S&P, May 2015, pp. 571-587.
-
(2015)
Proc. IEEE S&P
, pp. 571-587
-
-
Abdalla, M.1
Benhamouda, F.2
MacKenzie, P.3
-
65
-
-
85000869991
-
A secure anonymous authentication protocol for mobile services on elliptic curve cryptography
-
A. G. Reddy, A. K. Das, E. J. Yoon, and K.-Y. Yoo, A secure anonymous authentication protocol for mobile services on elliptic curve cryptography, '? IEEE Access, vol. 4, pp. 4394-4407, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 4394-4407
-
-
Reddy, A.G.1
Das, A.K.2
Yoon, E.J.3
Yoo, K.-Y.4
-
66
-
-
84983268338
-
Towards efficient content-Aware search over encrypted outsourced data in cloud
-
San Francisco, CA, USA, Apr
-
Z. Fu, X. Sun, S. Ji, and G. Xie, Towards efficient content-Aware search over encrypted outsourced data in cloud, '' in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM), San Francisco, CA, USA, Apr. 2016, pp. 1-9, doi: 10.1109/INFOCOM.2016.7524606.
-
(2016)
Proc. 35th Annu. IEEE Int. Conf. Comput. Commun. (IEEE INFOCOM
, pp. 1-9
-
-
Fu, Z.1
Sun, X.2
Ji, S.3
Xie, G.4
-
67
-
-
84991088919
-
Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement
-
Dec
-
Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706-2716, Dec. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.12
, pp. 2706-2716
-
-
Fu, Z.1
Wu, X.2
Guan, C.3
Sun, X.4
Ren, K.5
-
68
-
-
84962448916
-
A secure and dynamic multikeyword ranked search scheme over encrypted cloud data
-
Jan
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, A secure and dynamic multikeyword ranked search scheme over encrypted cloud data, '' IEEE Trans. Parallel Distrib. Syst, vol. 27, no. 2, pp. 340-352, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
69
-
-
84986631527
-
A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Nov
-
Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun, and K. Ren, A privacypreserving and copy-deterrence content-based image retrieval scheme in cloud computing, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
70
-
-
84990876133
-
-
London, U.K.: Springer, Oct
-
S. Zeadally and M. Badra, Eds., Privacy in a Digital, Networked World: Technologies, Implications and Solutions. London, U.K.: Springer, Oct. 2015.
-
(2015)
Privacy in A Digital, Networked World: Technologies, Implications and Solutions
-
-
Zeadally, S.1
Badra, M.2
-
71
-
-
84963856290
-
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Jul
-
Z. Liu, H. Seo, J. Groÿschädl, and H. Kim, Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes, '' IEEE Trans. Inf. Forensics Security, vol. 11, no. 7, pp. 1385-1397, Jul. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.7
, pp. 1385-1397
-
-
Liu, Z.1
Seo, H.2
Groÿschädl, J.3
Kim, H.4
|