4.2 Article

Provably secure user authentication and key agreement scheme for wireless sensor networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

Ashok Kumar Das

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Engineering, Electrical & Electronic

SEAP: Secure and Efficient Authentication Protocol for NFC Applications Using Pseudonyms

Vanga Odelu et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

A privacy preserving three-factor authentication protocol for e-Health clouds

Qi Jiang et al.

JOURNAL OF SUPERCOMPUTING (2016)

Article Computer Science, Information Systems

One-to-many authentication for access control in mobile pay-TV systems

Debiao He et al.

SCIENCE CHINA-INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

Ashok Kumar Das

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Proceedings Paper Computer Science, Information Systems

Enhancing Side-Channel Analysis of Binary-Field Multiplication with Bit Reliability

Peter Pessl et al.

TOPICS IN CRYPTOLOGY - CT-RSA 2016 (2016)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Theory & Methods

Effective Key Management in Dynamic Wireless Sensor Networks

Seung-Hyun Seo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards

Vanga Odelu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Review Computer Science, Information Systems

User authentication schemes for wireless sensor networks: A review

Saru Kumari et al.

AD HOC NETWORKS (2015)

Article Computer Science, Information Systems

An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks

Ashok Kumar Das

INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Telecommunications

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks

Qi Jiang et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Computer Science, Hardware & Architecture

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Kaiping Xue et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Ashok Kumar Das et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Article Computer Science, Information Systems

A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks

Nguyen Thi Thanh Huyen et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Engineering, Electrical & Electronic

An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network

Huyen Thi Thanh Nguyen et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)

Article Computer Science, Hardware & Architecture

Biometric identification

A Jain et al.

COMMUNICATIONS OF THE ACM (2000)