An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)
暂无分享,去创建一个
Anthony T. Chronopoulos | Shahaboddin Shamshirband | Shahaboddin Shamshirband | Hamed Bashirpour | Saman Bashirpour | Hamed Bashirpour | Saman Bashirpour
[1] Li Xu,et al. Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Morteza Nikooghadam,et al. A Protocol for Digital Signature Based on the Elliptic Curve Discrete Logarithm Problem , 2008 .
[3] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[4] Yookun Cho,et al. HORSIC: An efficient one-time signature scheme for wireless sensor networks , 2012, Inf. Process. Lett..
[5] Bin Zhao,et al. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..
[6] G. Meurice De Dormale,et al. Area and time trade-offs for iterative modular division over GF(2 m ): novel algorithm and implementations on FPGA , 2007 .
[7] Wenjing Lou,et al. Communication Security in Wireless Sensor Networks , 2008 .
[8] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[9] Bao Li,et al. An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[10] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[11] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[12] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[13] Ping Wang,et al. On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.
[14] Jianhua Li,et al. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards , 2010, IEEE Transactions on Industrial Electronics.
[15] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[16] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[17] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[18] Min-Shiang Hwang,et al. Improvement of signature scheme based on factoring and discrete logarithms , 2005, Appl. Math. Comput..
[19] Joo-Seok Song,et al. Knowledge-proof based versatile smart card verification protocol , 2000, CCRV.
[20] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[21] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[22] Yuguang Fang,et al. BABRA: Batch-based Broadcast Authentication in Wireless Sensor Networks , 2006 .
[23] Kefa Rabah. Elliptic Curve ElGamal Encryption and Signature Schemes , 2005 .
[24] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.
[25] Shiuh-Pyng Shieh,et al. An efficient broadcast authentication scheme in wireless sensor networks , 2006, ASIACCS '06.
[26] Wenjing Lou,et al. Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[27] Anupam Joshi,et al. Security in Sensor Networks , 2020, Texts in Computer Science.
[28] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[29] Wenjing Lou,et al. On Broadcast Authentication in Wireless Sensor Networks , 2007 .
[30] Yuan Xue,et al. A FAST AND EFFICIENT SOURCE AUTHENTICATION SOLUTION FOR BROADCASTING IN WIRELESS SENSOR NETWORKS , 2007 .
[31] Zinaida Benenson,et al. Realizing Robust User Authentication in Sensor Networks , 2005 .
[32] Kazukuni Kobara,et al. Lightweight Broadcast Authentication Protocols Reconsidered , 2009, 2009 IEEE Wireless Communications and Networking Conference.
[33] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[34] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[35] Hu Junru. The improved elliptic curve digital signature algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[36] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[37] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[38] P. Ning,et al. Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .
[39] Sushil Jajodia,et al. Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[40] Xiaoni Du,et al. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..