Author:
Li Xiong,Niu Jianwei,Kumari Saru,Wu Fan,Sangaiah Arun Kumar,Choo Kim-Kwang Raymond
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference31 articles.
1. Wireless sensor networks: a survey;Akyildiz;Comput. Netw.,2002
2. The internet of things: a survey;Atzori;Comput. Netw.,2010
3. Burrows, M., Abadi, M., Needham, R.M., 1989. A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, volume 426, The Royal Society, pp. 233–271.
4. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography;Choi;Sensors,2014
5. Two-factor user authentication in wireless sensor networks;Das;IEEE Trans. Wirel. Commun.,2009
Cited by
273 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献