相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
Ruhul Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
ABE with improved auxiliary input for big data security
Zhiwei Wang et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2017)
Efficient location privacy algorithm for Internet of Things (IoT) services and applications
Gang Sun et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A password based authentication scheme for wireless multimedia systems
Nishant Doshi et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
Shahid Anwar et al.
ALGORITHMS (2017)
Delay and link utilization aware routing protocol for wireless multimedia sensor networks
Zara Hamid et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
Securing data exchange in wireless multimedia sensor networks: perspectives and challenges
Musab Ghadi et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2016)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Mohammad Sabzinejad Farash et al.
AD HOC NETWORKS (2016)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Ruhul Amin et al.
AD HOC NETWORKS (2016)
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
Shipra Kumari et al.
COMPUTER NETWORKS (2016)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin et al.
COMPUTER NETWORKS (2016)
Cloud computing adoption framework: A security framework for business clouds
Victor Chang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
Empirical Studies on Usability of mHealth Apps: A Systematic Literature Review
Belen Cruz Zapata et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He et al.
MULTIMEDIA SYSTEMS (2015)
Authentication of mobile applications through various local distributors
Kyusuk Han et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2015)
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
Junghyun Nam et al.
PLOS ONE (2015)
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Qi Jiang et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
Towards a Big Data system disaster recovery in a Private Cloud
Victor Chang
AD HOC NETWORKS (2015)
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang et al.
AD HOC NETWORKS (2014)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic et al.
AD HOC NETWORKS (2014)
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang et al.
COMPUTER NETWORKS (2014)
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim et al.
SENSORS (2014)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi et al.
SENSORS (2014)
Notes on A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks
Muhamed Turkanovic et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks
M. Turkanovic et al.
ELEKTRONIKA IR ELEKTROTECHNIKA (2013)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
Kaiping Xue et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
Chun-Ta Li et al.
SENSORS (2013)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Ashok Kumar Das et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
Pardeep Kumar et al.
SENSORS (2012)
Discussion on Application of IOT Technology in Coal Mine Safety Supervision
Zhang Yinghua et al.
INTERNATIONAL SYMPOSIUM ON SAFETY SCIENCE AND ENGINEERING IN CHINA, 2012 (2012)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-Lien Yeh et al.
SENSORS (2011)
Advanced smart card based password authentication protocol
Ronggong Song
COMPUTER STANDARDS & INTERFACES (2010)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen et al.
ETRI JOURNAL (2010)
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
Muhammad Khurram Khan et al.
SENSORS (2010)
An improved smart card based password authentication scheme with provable security
Jing Xu et al.
COMPUTER STANDARDS & INTERFACES (2009)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
An application-specific protocol architecture for wireless microsensor networks
WB Heinzelman et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2002)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)