相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Two-factor mutual authentication with key agreement in wireless sensor networks
Binod Vaidya et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)
Maximum Damage Malware Attack in Mobile Wireless Networks
M. H. R. Khouzani et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
Woongryul Jeon et al.
IEICE TRANSACTIONS ON COMMUNICATIONS (2012)
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
He Debiao et al.
INFORMATION FUSION (2012)
Maximum Damage Battery Depletion Attack in Mobile Sensor Networks
M. H. R. Khouzani et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2011)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-Lien Yeh et al.
SENSORS (2011)
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Yunho Lee et al.
COMPUTERS & ELECTRICAL ENGINEERING (2010)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen et al.
ETRI JOURNAL (2010)
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
Muhammad Khurram Khan et al.
SENSORS (2010)
An Off-Line Dictionary Attack on a Simple Three-Party Key Exchange Protocol
Junghyun Nam et al.
IEEE COMMUNICATIONS LETTERS (2009)
Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
Xuefei Cao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Identity-based key agreement protocols from pairings
L. Chen et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2007)
Security analysis of a nonce-based user authentication scheme using smart cards
Junghyun Nam et al.
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES (2007)
Security enhancement on a new authentication scheme with anonymity for wireless environments
Cheng-Chi Lee et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2006)
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Venkata C. Giruka et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2006)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)