4.6 Article

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Two-factor mutual authentication with key agreement in wireless sensor networks

Binod Vaidya et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wenbo Shi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Maximum Damage Malware Attack in Mobile Wireless Networks

M. H. R. Khouzani et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2012)

Article Engineering, Electrical & Electronic

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments

Woongryul Jeon et al.

IEICE TRANSACTIONS ON COMMUNICATIONS (2012)

Article Automation & Control Systems

Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

M. H. R. Khouzani et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2011)

Article Computer Science, Hardware & Architecture

Enhancement of two-factor authenticated key exchange protocols in public wireless LANs

Yunho Lee et al.

COMPUTERS & ELECTRICAL ENGINEERING (2010)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Telecommunications

An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange Protocol

Junghyun Nam et al.

IEEE COMMUNICATIONS LETTERS (2009)

Article Engineering, Electrical & Electronic

Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks

Xuefei Cao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Information Systems

Identity-based key agreement protocols from pairings

L. Chen et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2007)

Article Computer Science, Hardware & Architecture

Security analysis of a nonce-based user authentication scheme using smart cards

Junghyun Nam et al.

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2007)

Article Automation & Control Systems

Security enhancement on a new authentication scheme with anonymity for wireless environments

Cheng-Chi Lee et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2006)

Article Computer Science, Theory & Methods

A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC

Venkata C. Giruka et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2006)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)