A secure user authentication protocol for sensor network in data capturing
暂无分享,去创建一个
[1] Zhou Quan,et al. Trusted transport mode based cluster-merkle-tree for wireless sensor networks , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[2] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[3] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[4] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[5] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[6] Changjun Jiang,et al. A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.
[7] Viktor Mayer-Schönberger,et al. The Rise of Big Data: How It’s Changing the Way We Think about the World , 2014 .
[8] Chi-Kwong Chan,et al. Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[9] Peng Gong,et al. A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.
[10] Quan Zhou,et al. Trusted architecture for farmland wireless sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Mznah Al-Rodhaan,et al. An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[13] W. Han. Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, IACR Cryptol. ePrint Arch..
[14] Lee-Chun Ko,et al. A novel dynamic user authentication scheme for wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[15] Mun-Kyu Lee,et al. Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks , 2009, IACR Cryptol. ePrint Arch..
[16] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[17] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[18] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[19] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[20] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[21] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..
[22] Eun-Jun Yoon,et al. A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[23] Muhammad Khurram Khan,et al. Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' , 2010, AST/UCMA/ISA/ACN.
[24] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.