Efficient User Authentication and Key Agreement in Wireless Sensor Networks
暂无分享,去创建一个
[1] Adi Shamir,et al. Factoring Estimates for a 1024-Bit RSA Modulus , 2003, ASIACRYPT.
[2] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Wei-Chi Ku,et al. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[5] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[6] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[9] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[10] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[13] Tzonelih Hwang,et al. Reparable key distribution protocols for Internet environments , 1995, IEEE Trans. Commun..
[14] Min-Shiang Hwang,et al. Cryptanalysis of Simple Authenticated Key Agreement Protocols , 2004 .
[15] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[16] Chun-Li Lin,et al. Provably secure authenticated key exchange protocols for low power computing clients , 2006, Comput. Secur..
[17] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[18] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Scott Shenker,et al. Geographic routing without location information , 2003, MobiCom '03.
[20] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[21] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[22] Wen-Shenq Juang,et al. Efficient password authenticated key agreement using smart cards , 2004, Comput. Secur..
[23] Yan Huang,et al. NeuRon/spl trade/ netform: a self-organizing wireless sensor network , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[24] Bruce Schneier. One-way hash functions , 1991 .
[25] Paul Syverson,et al. A Taxonomy of Replay Attacks , 1994 .
[26] Kang G. Shin,et al. LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.
[27] Chi Sung Laih,et al. Advances in Cryptology - ASIACRYPT 2003 , 2003 .
[28] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[29] William Stallings,et al. Cryptography and network security , 1998 .
[30] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[31] James Newsome,et al. GEM: Graph EMbedding for routing and data-centric storage in sensor networks without geographic information , 2003, SenSys '03.