On the design of secure user authenticated key management scheme for multigateway‐based wireless sensor networks using ECC
暂无分享,去创建一个
Athanasios V. Vasilakos | Joel J. P. C. Rodrigues | Ashok Kumar Das | Neeraj Kumar | Anil Kumar Sutrala | Goutham Reddy Alavalapati | A. Vasilakos | Neeraj Kumar | J. Rodrigues | A. Das
[1] Marko Hölbl,et al. An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks , 2013 .
[2] Samiran Chattopadhyay,et al. Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things , 2018, IEEE Internet of Things Journal.
[3] Ashok Kumar Das. A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.
[4] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[5] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[6] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[7] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[8] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[9] Xinyi Huang,et al. Provably secure authenticated key agreement scheme for distributed mobile cloud computing services , 2017, Future Gener. Comput. Syst..
[10] Xiong Li,et al. Provably secure three-factor authentication and key agreement scheme for session initiation protocol , 2016, Secur. Commun. Networks.
[11] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[12] Kirti Kamthe,et al. Enhanced Three-Factor Security Protocol For Consumer USB Mass Storage Devices , 2017 .
[13] Ping Wang,et al. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.
[14] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Seigo Arita,et al. A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[17] Michael Gerndt,et al. Wireless sensors networks for Internet of Things , 2016, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[18] Kim-Kwang Raymond Choo,et al. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.
[19] Victor C. M. Leung,et al. Predicting Temporal Social Contact Patterns for Data Forwarding in Opportunistic Mobile Networks , 2017, IEEE Transactions on Vehicular Technology.
[20] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[21] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[22] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[23] Athanasios V. Vasilakos,et al. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.
[24] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[25] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[26] Laurence T. Yang,et al. Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning , 2018, IEEE Internet of Things Journal.
[27] Joel J. P. C. Rodrigues,et al. Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment , 2017, IEEE Transactions on Industrial Informatics.
[28] Athanasios V. Vasilakos,et al. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.
[29] Sandeep Kumar,et al. Embedded end-to-end wireless security with ECDH key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[30] Xiong Li,et al. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.
[31] Bang Wang,et al. Confident Information Coverage Hole Healing in Hybrid Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[32] Jian Shen,et al. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..
[33] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[34] Jing Gao,et al. Approximate event detection over multi-modal sensing data , 2016, J. Comb. Optim..
[35] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[36] Daojing He,et al. An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks , 2011, Journal of Zhejiang University SCIENCE C.
[37] Da-Zhi Sun,et al. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[38] Palash Sarkar,et al. A Simple and Generic Construction of Authenticated Encryption with Associated Data , 2010, TSEC.
[39] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[40] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[41] Xiong Li,et al. Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.
[42] Ashok Kumar Das,et al. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks , 2015, Secur. Commun. Networks.
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Jianfeng Ma,et al. An novel three-party authenticated key exchange protocol using one-time key , 2013, J. Netw. Comput. Appl..
[45] Guido Marchetto,et al. Push applications and dynamic content generation over content‐centric networking , 2017, Int. J. Commun. Syst..
[46] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[47] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[48] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[49] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[50] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[51] Cheng-Chi Lee,et al. Two Attacks on a Two-Factor User Authentication in Wireless Sensor Networks , 2011, Parallel Process. Lett..
[52] Vanga Odelu,et al. A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks , 2015, Wireless Personal Communications.
[53] Ashok Kumar Das,et al. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..
[54] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[55] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[56] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[57] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.