A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[2] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[3] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[4] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[5] Chi-Kwong Chan,et al. Cryptanalysis of a modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[6] Muhammad Khurram Khan,et al. Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' , 2010, AST/UCMA/ISA/ACN.
[7] Jianhua Chen,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[10] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[13] S. Vanstone,et al. Elliptic Curve Cryptosystems , 1993 .
[14] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[15] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[16] Weidong Kou,et al. Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks , 2009, IEEE Transactions on Vehicular Technology.
[17] Liqun Chen,et al. Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.
[18] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[19] W. Han. Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, IACR Cryptol. ePrint Arch..
[20] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.