1 |
咎亚洲, 刘文芬, 魏江宏 等. 适用于无线传感器网络的动态ID认证方案. 密码学报 2014,1(5):422~436 Zan Y Z , Liu W F , Wei J H , et al. A novel dynamic ID-based user authentication scheme for wireless sensor networks using smart cards. Journal of Cryptologic Research, 2014,1(5):422~436
|
2 |
王小刚, 石为人, 周伟 等. 一种基于二次型的无线传感器网络密钥管理方案. 电子学报 2013,41(2):214~219 Wang X G , Shi W R , Zhou W , et al. A key management scheme based on quadratic form for wireless sensor network. Acta Electronica Sinica, 2013,41(2):214~219
|
3 |
Vaidya B , Makrakis D , Mouftah H T . Improved two-factor user authentication in wireless sensor networks. Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications(WiMob), Shenzhen, China, 2010:600~606
|
4 |
Mnif A , Cheikhrouhou O , Jemaa M B . An ID-based user authentication scheme for wireless sensor networks using ECC. Proceedings of 2011 International Conference on Microelectronics(ICM), Nanjing, China, 2011:1~9
|
5 |
Huang X , Dharmendra S , Cui H Y . Fuzzy controlling window for elliptic curve cryptography in wireless sensor networks. Proceedings of the International Conference on Information Networking 2014(ICOIN2014), Xiamen, China, 2014:312~317
|
6 |
Faye Y , Guyennet H , Niang I , et al. Fast scalar multiplication on elliptic curve cryptography in selected intervals suitable for wireless sensor networks. Lecture Notes in Computer Science, 2013(1):171~182
|
7 |
周治平, 庄学波 . 基于P-ECC 和同余方程的分簇 WSN 节点身份认证机制. 计算机应用, 2014,34(1):104~107 Zhou Z P , Zhuang X B . Node identity authentication scheme for clustered WSNs based on P-ECC and congruence equation. Journal of Computer Applications, 2014,34(1):104~107
|
8 |
Xue K , Ma C , Hong P , et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network&Computer Applications, 2013,36(1):316~323
|
9 |
刘云, 杨亮, 范科峰 等. 一种改进的动态用户认证协议. 电子学报 2013,41(1):42~46 Liu Y , Yang L , Fan K F , et al. Improved dynamic user authentication protocol. Acta Electronica Sinica, 2013,41(1):42~46
|
10 |
戚湧, 高双双, 李千目 . 基于动态软键盘和随机码的Web 口令安全传输. 南京理工大学学报 2014,38(6):745~749 Qi Y , Gao S S , Li Q M . Security transfer of Web password based on dynamic soft keyboard and random code. Journal of Nanjing University of Science and Technology, 2014,38(6):745~749
|
11 |
Pippal R S , Gupta P , Singh R . A novel smart card authentication scheme using image encryption. International Journal of Computer Applications, 2013,72(9):8~14
|
12 |
Wei J H , Liu W F , Hu X X . Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 2014,77(3):2255~2269
|
13 |
Li X , Niu J W , Kumari S , et al. An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 2015,80(1):175~192
|
14 |
汪定, 马春光, 翁臣 等. 一种适于受限资源环境的远程用户认证方案的分析与改进. 电子与信息学报 2012,34(10):2520~2526 Wang D , Ma C G , Weng C , et al. Cryptanalysis and improvement of a remote user authentication scheme for resource-limited environment. Journal of Electronics&Information Technology, 2012,34(10):2520~2526
|
15 |
张青 . 基于智能卡的多服务器环境下的远端认证协议. 计算机应用研究 2014,31(7):2109~2115 Zhang Q . Remote authentication protocol for multi-servers based on smart card. Application Research of Computers, 2014,31(7):2109~2115
|