User Authentication with Distributed Cluster Formation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Jong Hyuk Park,et al. User authentication schemes with pseudonymity for ubiquitous sensor network in NGN , 2010, Int. J. Commun. Syst..
[2] Siddharth Agarwal,et al. An Improved Fast and Secure Hash Algorithm , 2012, J. Inf. Process. Syst..
[3] Neil Haller,et al. The S/KEY One-Time Password System , 1995, RFC.
[4] H. T. Mouftah,et al. Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[5] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[6] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[7] K. Thirumoorthy,et al. Improved user authentication in Wireless Sensor Networks , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[8] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.