Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications
暂无分享,去创建一个
Sungchang Lee | Fawad Zaman | Sarmad Ullah Khan | Mohamad K. A. Rahim | M. Rahim | Sungchang Lee | F. Zaman | Sarmadullah Khan
[1] Mznah Al-Rodhaan,et al. An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[2] Jiankun Hu,et al. Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection , 2018, Wirel. Commun. Mob. Comput..
[3] Imran Baig,et al. A survey on routing techniques in underwater wireless sensor networks , 2011, J. Netw. Comput. Appl..
[4] YoungHo Park,et al. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.
[5] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[6] Guangchun Luo,et al. An on-demand global time synchronization based on data analysis for wireless sensor networks , 2017, IIKI.
[7] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[8] Muhammad Arshad,et al. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks , 2017, J. Sensors.
[9] Qiang Liu,et al. Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing , 2018, Wirel. Commun. Mob. Comput..
[10] Divya Upadhyay,et al. Time synchronization problem of wireless sensor network using maximum probability theory , 2018, Int. J. Syst. Assur. Eng. Manag..
[11] Chao Yang,et al. TensorBeat , 2017, ACM Trans. Intell. Syst. Technol..
[12] Changjun Jiang,et al. A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.
[13] Aikaterini Mitrokotsa,et al. Privacy-Preserving Biometric Authentication: Challenges and Directions , 2017, Secur. Commun. Networks.
[14] Sharad Saxena,et al. Challenges and issues in underwater acoustics sensor networks: A review , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[15] Nianmin Yao,et al. Relative Distance Based Forwarding Protocol for Underwater Wireless Networks , 2014, Int. J. Distributed Sens. Networks.
[16] Fawad Zaman,et al. Joint Angle-Amplitude Estimation for Multiple Signals with L-Structured Arrays Using Bioinspired Computing , 2017, Wirel. Commun. Mob. Comput..
[17] S. Basagni,et al. Channel-aware routing for underwater wireless networks , 2012, 2012 Oceans - Yeosu.
[18] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[19] G. Padmavathi,et al. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.
[20] Yuanyuan Zhang,et al. Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.
[21] K. Mackenzie. Nine‐term equation for sound speed in the oceans , 1981 .
[22] Frans C. A. Groen,et al. Feature-based human motion parameter estimation with radar , 2008 .
[23] Sanam Shahla Rizvi,et al. BAS: The Biphase Authentication Scheme for Wireless Sensor Networks , 2017, Secur. Commun. Networks.
[24] Lei Huang,et al. Multiantenna Assisted Source Detection in Toeplitz Noise Covariance , 2019, IEEE Signal Processing Letters.
[25] Vijaya Kumar,et al. A Survey on Authentication Techniques for Wireless Sensor Networks , 2012 .
[26] Raja Muhammad Asif Zahoor,et al. Novel application of FO-DPSO for 2-D parameter estimation of electromagnetic plane waves , 2018, Neural Computing and Applications.
[27] Winston K. G. Seah,et al. A Survey of Techniques and Challenges in Underwater Localization , 2011 .
[28] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[29] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[30] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[31] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[32] Shaojie Tang,et al. Electronic frog eye: Counting crowd using WiFi , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[33] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[34] Dongwoo Kang,et al. Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity , 2018, Secur. Commun. Networks.
[35] Faisal Karim Shaikh,et al. Underwater Sensor Network Applications: A Comprehensive Survey , 2015, Int. J. Distributed Sens. Networks.
[36] Mohammad S. Obaidat,et al. A novel Geocast technique with hole detection in underwater sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[37] Dongkyun Kim,et al. An Energy Efficient Localization-Free Routing Protocol for Underwater Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[38] Rakesh Maharana. An Improved User Authentication Protocol for Hierarchical Wireless Sensor Networks using Elliptic Curve Cryptography , 2013 .
[39] Eun-Jun Yoon,et al. A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[40] M. Stojanovic,et al. Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.
[41] Kaishun Wu,et al. WiFall: Device-Free Fall Detection by Wireless Networks , 2017, IEEE Transactions on Mobile Computing.
[42] Zheng Guo,et al. Adaptive Routing in Underwater Delay/Disruption Tolerant Sensor Networks , 2008, 2008 Fifth Annual Conference on Wireless on Demand Network Systems and Services.
[43] Mario Gerla,et al. VAPR: Void-Aware Pressure Routing for Underwater Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[44] Athanassios Manikas,et al. Joint Transmitter–Receiver Optimization in Multitarget MIMO Radar , 2017, IEEE Transactions on Signal Processing.
[45] Vallipuram Muthukkumarasamy,et al. The Analysis of Temperature, Depth, Salinity Effect on Acoustic Speed for a Vertical Water Column , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[46] Yunhao Liu,et al. Widar2.0: Passive Human Tracking with a Single Wi-Fi Link , 2018, MobiSys.
[47] Mohsen Guizani,et al. Routing protocols for underwater wireless sensor networks , 2015, IEEE Communications Magazine.
[48] Punam Bedi,et al. Minutiae Extraction from Fingerprint Images - a Review , 2011, ArXiv.
[49] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[50] Roberto Hornero,et al. Interpretation of the Lempel-Ziv Complexity Measure in the Context of Biomedical Signal Analysis , 2006, IEEE Transactions on Biomedical Engineering.
[51] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[52] Minrui Fei,et al. Randomized and Efficient Time Synchronization in Dynamic Wireless Sensor Networks: A Gossip-Consensus-Based Approach , 2018, Complex..
[53] Yuh-Shyan Chen,et al. A mobicast routing protocol in underwater sensor networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[54] Deshi Li,et al. A Link-State Based Adaptive Feedback Routing for Underwater Acoustic Sensor Networks , 2013, IEEE Sensors Journal.
[55] Romaric Audigier,et al. RIMOC, a feature to discriminate unstructured motions: Application to violence detection for video-surveillance , 2016, Comput. Vis. Image Underst..
[56] Ibrahima Niang,et al. A Survey of Access Control Schemes in Wireless Sensor Networks , 2011 .
[57] Milica Stojanovic,et al. On the relationship between capacity and distance in an underwater acoustic communication channel , 2007, MOCO.
[58] Sandra Sendra,et al. Underwater Wireless Ad Hoc Networks: A Survey , 2016 .
[59] Jing Wang,et al. Spatio-temporal texture modelling for real-time crowd anomaly detection , 2016, Comput. Vis. Image Underst..
[60] Qun Li,et al. Achieving Distributed User Access Control in Sensor Networks , 2022 .
[61] Amit K. Awasthi,et al. Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement , 2016, Wirel. Pers. Commun..