Security enhanced user authentication scheme for wireless sensor network
暂无分享,去创建一个
[1] Chi-Kwong Chan,et al. Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[2] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[3] Jongin Lim,et al. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks , 2009, IEEE Communications Letters.
[4] Eun-Jun Yoon,et al. An improvement of Hwang-Lee-Tang's simple remote user authentication scheme , 2005, Comput. Secur..
[5] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[6] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[7] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[8] Chia-Chun Wu,et al. An improvement of secure authentication scheme with full anonymity for wireless communications , 2009, ICIS.
[9] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[10] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..
[11] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[12] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[13] Lee-Chun Ko,et al. A novel dynamic user authentication scheme for wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[14] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[15] Dong Hoon Lee,et al. Security flaw of authentication scheme with anonymity for wireless communications , 2009, IEEE Communications Letters.
[16] Chin-Chen Chang,et al. Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[17] Zhenfu Cao,et al. On the anonymity of some authentication schemes for wireless communications , 2009, IEEE Commun. Lett..
[18] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[19] Chin-Chen Chang,et al. Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..
[20] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[21] Dong Hoon Lee,et al. A remote user authentication scheme without using smart cards , 2009, Comput. Stand. Interfaces.