4.6 Article

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

ABE with improved auxiliary input for big data security

Zhiwei Wang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2017)

Article Computer Science, Hardware & Architecture

Efficient location privacy algorithm for Internet of Things (IoT) services and applications

Gang Sun et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

A password based authentication scheme for wireless multimedia systems

Nishant Doshi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Review Computer Science, Artificial Intelligence

From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

Shahid Anwar et al.

ALGORITHMS (2017)

Article Computer Science, Information Systems

Delay and link utilization aware routing protocol for wireless multimedia sensor networks

Zara Hamid et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Securing data exchange in wireless multimedia sensor networks: perspectives and challenges

Musab Ghadi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines

Shipra Kumari et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Theory & Methods

Cloud computing adoption framework: A security framework for business clouds

Victor Chang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Health Care Sciences & Services

Empirical Studies on Usability of mHealth Apps: A Systematic Literature Review

Belen Cruz Zapata et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Information Systems

Authentication of mobile applications through various local distributors

Kyusuk Han et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Information Systems

Towards a Big Data system disaster recovery in a Private Cloud

Victor Chang

AD HOC NETWORKS (2015)

Article Computer Science, Hardware & Architecture

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang et al.

COMPUTER NETWORKS (2014)

Article Telecommunications

Notes on A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks

Muhamed Turkanovic et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Engineering, Electrical & Electronic

An Improved Dynamic Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks

M. Turkanovic et al.

ELEKTRONIKA IR ELEKTROTECHNIKA (2013)

Article Computer Science, Hardware & Architecture

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Kaiping Xue et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Information Systems

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

Wenbo Shi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Computer Science, Hardware & Architecture

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

Ashok Kumar Das et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2012)

Proceedings Paper Economics

Discussion on Application of IOT Technology in Coal Mine Safety Supervision

Zhang Yinghua et al.

INTERNATIONAL SYMPOSIUM ON SAFETY SCIENCE AND ENGINEERING IN CHINA, 2012 (2012)

Article Computer Science, Hardware & Architecture

Advanced smart card based password authentication protocol

Ronggong Song

COMPUTER STANDARDS & INTERFACES (2010)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Computer Science, Hardware & Architecture

An improved smart card based password authentication scheme with provable security

Jing Xu et al.

COMPUTER STANDARDS & INTERFACES (2009)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Engineering, Electrical & Electronic

An application-specific protocol architecture for wireless microsensor networks

WB Heinzelman et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2002)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)