Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks
暂无分享,去创建一个
V. O. Nyangaresi | I. Q. Abduljaleel | Z. Abduljabbar | Abdulla J. Y. Aldarwish | M. A. A. Sibahee | M. J. J. Ghrabat | Junchao Ma
[1] V. O. Nyangaresi,et al. Efficient Authentication Algorithm for Secure Remote Access in Wireless Sensor Networks , 2021, Journal of Computer Science Research.
[2] V. O. Nyangaresi,et al. Certificate Based Authentication Scheme for Smart Homes , 2021, 2021 3rd Global Power, Energy and Communication Conference (GPECOM).
[3] Vincent Omollo Nyangaresi,et al. Lightweight Key Agreement and Authentication Protocol for Smart Homes , 2021, 2021 IEEE AFRICON.
[4] V. O. Nyangaresi. ECC Based Authentication Scheme for Smart Homes , 2021, 2021 International Symposium ELMAR.
[5] Vincent Omollo Nyangaresi,et al. Mutual Authentication Protocol for Secure VANET Data Exchanges , 2021, FABULOUS.
[6] Neeraj Kumar,et al. A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion , 2020, IEEE Systems Journal.
[7] V. O. Nyangaresi. Hardware Assisted Protocol for Attacks Prevention in Ad Hoc Networks , 2021, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[8] Silvance O. Abeka,et al. Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications , 2020, 2020 16th International Computer Engineering Conference (ICENCO).
[9] Joel J. P. C. Rodrigues,et al. Cloud Centric Authentication for Wearable Healthcare Monitoring System , 2019, IEEE Transactions on Dependable and Secure Computing.
[10] Taekyoung Kwon,et al. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.
[11] Georges Kaddoum,et al. A Collaborative Security Framework for Software-Defined Wireless Sensor Networks , 2020, IEEE Transactions on Information Forensics and Security.
[12] Devender Kumar,et al. A secure three-factor authentication scheme for wireless sensor networks using ECC , 2020, Journal of Discrete Mathematical Sciences and Cryptography.
[13] Dariush Abbasinezhad-Mood,et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..
[14] Guoai Xu,et al. A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map , 2019, IEEE Access.
[15] Ying Chen,et al. An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.
[16] Maede Ashouri-Talouki,et al. Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks , 2019, Peer-to-Peer Netw. Appl..
[17] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[18] Shahid Mumtaz,et al. Energy Prediction Based MAC Layer Optimization for Harvesting Enabled WSNs in Smart Cities , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).
[19] Sedat Akleylek,et al. A survey on security threats and authentication approaches in wireless sensor networks , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).
[20] Dariush Abbasinezhad-Mood,et al. Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps , 2018, IEEE Transactions on Industrial Informatics.
[21] Mauro Conti,et al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..
[22] Xiong Li,et al. An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[23] Chenyu Wang,et al. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks , 2017, Sensors.
[24] V. N. Sastry,et al. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..
[25] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[26] Yi Xie,et al. An Optimization Scheme of Enhanced Adaptive Dynamic Energy Consumption Based on Joint Network-Channel Coding in WSNs , 2017, IEEE Sensors Journal.
[27] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[28] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[29] Xiong Li,et al. A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..
[30] YoHan Park,et al. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks , 2016, Sensors.
[31] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[32] Xiangjian He,et al. Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.
[33] Yang Yu,et al. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks , 2016, Sensors.
[34] Yang Yu,et al. A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique , 2016 .
[35] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[36] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[37] Mubashir Husain Rehmani,et al. Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..
[38] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[39] Xiong Li,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.
[40] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[41] Victor C. M. Leung,et al. Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing , 2015, IEEE Transactions on Computers.
[42] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[43] Chin-Ling Chen,et al. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks , 2015, J. Sensors.
[44] Rajamanickam Murugesan,et al. A node authentication clustering based security for ADHOC network , 2014, 2014 International Conference on Communication and Signal Processing.
[45] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[46] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.