WSN node access authentication protocol based on trusted computing
暂无分享,去创建一个
Yingxu Lai | Jing Liu | Hua Qin | Zenghui Liu | Shiyao Luo | Lihui Liu
[1] Hyoungshick Kim,et al. Cryptanalysis of Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment , 2020, 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM).
[2] Saru Kumari,et al. Provably secure biometric based authentication and key agreement protocol for wireless sensor networks , 2017, Journal of Ambient Intelligence and Humanized Computing.
[3] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[4] Ling Zhang,et al. Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System , 2018, Wirel. Commun. Mob. Comput..
[5] Athanasios V. Vasilakos,et al. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..
[6] Alan Dahgwo Yein,et al. A secure mutual trust scheme for wireless sensor networks , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[7] Jianfeng Ma,et al. A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks , 2017, Int. J. Netw. Manag..
[8] Xiong Li,et al. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security , 2017, J. Ambient Intell. Humaniz. Comput..
[9] Muzzammil Hussain,et al. Simple, secure and dynamic protocol for mutual authentication of nodes in wireless sensor networks , 2017, 2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[10] Xiong Li,et al. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..
[11] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[12] Weijun Gao,et al. AVISPA: a web tool for the prediction and analysis of alternative splicing , 2013, Genome Biology.
[13] Xin Liu,et al. A fingerprint-based user authentication protocol with one-time password for wireless sensor networks , 2013, PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System.
[14] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[15] Kouichi Sakurai,et al. Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic , 2005, ARSPA@ICALP.
[16] Paul F. Syverson,et al. On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[17] Yalin Chen,et al. Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, IACR Cryptol. ePrint Arch..
[18] Zhang Huan,et al. Research on Trusted Network Connection , 2010 .