Open Access
Issue |
MATEC Web Conf.
Volume 309, 2020
2019 International Conference on Computer Science Communication and Network Security (CSCNS2019)
|
|
---|---|---|
Article Number | 02001 | |
Number of page(s) | 10 | |
Section | Network Security and Software Design | |
DOI | https://doi.org/10.1051/matecconf/202030902001 | |
Published online | 04 March 2020 |
- Das M L. Two-factor user authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 2009, 8(3): 1086–1090. [CrossRef] [Google Scholar]
- Nyang D H, Lee M K. Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks[J]. IACR Cryptology ePrint Archive, 2009, 2009: 631. [Google Scholar]
- He D, Gao Y, Chan S, et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks[J]. Ad Hoc & Sensor Wireless Networks, 2010, 10(4): 361–371. [Google Scholar]
- Kumar P, Lee H J. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks[C]//Wireless Advanced (WiAd) 2011. IEEE, 2011: 241–245. [Google Scholar]
- Yoo S G, Park K Y, Kim J. A security-performance-balanced user authentication scheme for wireless sensor networks[J]. International iournal of distributed sensor networks, 2012, 2012. [Google Scholar]
- Jiang Q, Ma J, Lu X, et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks[J]. Peer-to-Peer Networking and Applications, 2014: 1–12. [Google Scholar]
- Sun D Z, Li J X, Feng Z Y, et al. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks[J]. Personal and ubiquitous computing, 2013, 17(5): 895–905. [CrossRef] [Google Scholar]
- Das A K. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks[J]. Peer-to-Peer Networking and Applications, 2014: 1–22. [Google Scholar]
- Das A K. An efficient and novel three-factor user authentication scheme for large-scale heterogeneous wireless sensor networks[J]. International Journal of Communication Networks and Distributed Systems, 2015, 15(1): 22–60. [CrossRef] [Google Scholar]
- Althobaiti, O., Al-Rodhaan, M., Al-Dhelaan, A.: An efficient biometric authentication protocol for wireless sensor networks. International Journal of Distributed Sensor Networks 2013, Article ID 407971, 1–13 (2013) [Google Scholar]
- Das A K. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor[J]. International Journal of Communication Systems, 2015. [Google Scholar]
- Ashok Kumar Das. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Wireless Personal Communication,2015,82(1):1377–1404. [CrossRef] [Google Scholar]
- Das, A. K. (2012). A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. International Journal of Information Security, 11(3),189–211. [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.