Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference25 articles.
1. [1] T.R. Halford, “How to Prove Yourself to Multiple Parties: Energy-Efficient Multi-group Authentication,” Proc. IEEE MILCOM 2013, pp.237-242, Nov. 2013. 10.1109/milcom.2013.49
2. [2] A. Fiat and A. Shamir, “How to prove yourself: Practical solutions to identification and signature problems,” Advances in Cryptology-CRYPTO'86, pp.186-194, Dec. 1986.
3. [3] K.H.M. Wong, Y. Zheng, J. Cao, and S. Wang, “A dynamic user authentication scheme for wireless sensor networks,” Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), vol.1, pp.244-251, June 2006. 10.1109/sutc.2006.1636182
4. [4] M.L. Das, “Two-factor user authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol.8, no.3, pp.1086-1090, May 2009. 10.1109/twc.2008.080128
5. [5] M.K. Khan and K. Alghathbar, “Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’,” Sensors, vol.10, no.3, pp.2450-2459, March 2010. 10.3390/s100302450