Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
暂无分享,去创建一个
[1] Dae-Wha Seo,et al. Intrusion detection based on traffic analysis in wireless sensor networks , 2010, The 19th Annual Wireless and Optical Communications Conference (WOCC 2010).
[2] Vangalur S. Alagar,et al. Publishing and discovering context-dependent services , 2013, Human-centric Computing and Information Sciences.
[3] Mun-Kyu Lee,et al. Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks , 2009, IACR Cryptol. ePrint Arch..
[4] D. K. Lobiyal,et al. Performance evaluation of data aggregation for cluster-based wireless sensor network , 2013, Human-centric Computing and Information Sciences.
[5] Chun-Hung Liu,et al. Enhancement of Two-Factor User Authentication in Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[6] Chun Chen,et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[7] Hoon-Jae Lee,et al. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks , 2011, 2011 Wireless Advanced.
[8] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[9] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[10] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[11] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[12] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[13] H. T. Mouftah,et al. Improved two-factor user authentication in wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[14] Kyoung-Son Jhang,et al. A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance , 2013, J. Inf. Process. Syst..
[15] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[16] Rei-Heng Cheng,et al. Enhancing Network Availability by Tolerance Control in Multi-Sink Wireless Sensor Network , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.