Publisher
Springer Science and Business Media LLC
Subject
Renewable Energy, Sustainability and the Environment,Artificial Intelligence,Computer Science Applications,Computer Networks and Communications
Reference55 articles.
1. Abdmeziem MR, Tandjaoui D (2015) An end-to-end secure key management protocol for e-health applications. Comput Electr Eng 44:184–197
2. Watro R, Kong D, Cuti S, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, ACM, pp 59–64
3. Benenson Z, Gedicke N, Raivio O (2005) Realizing robust user authentication in sensor networks. Real-World Wirel Sens Netw 14:52
4. Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. In: IEEE international conference on sensor networks, ubiquitous, and trustworthy computing (SUTC’06), IEEE, vol 1, pp 8
5. Tseng H-R, Jan R-H, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In: IEEE GLOBECOM 2007-IEEE global telecommunications conference, pp 986–990
Cited by
85 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献