1 |
Kumari, Saru, Muhammad Khurram Khan, and Mohammed Atiquzzaman, "User authentication schemes for wireless sensor networks: A review," Ad Hoc Networks, 2015, pp.159-194.
DOI
|
2 |
Jiang, Qi, et al, "A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks," International Journal of Network Management, Vol.27, No.3, 2017.
|
3 |
Choi, Younsung, et al, "Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.14, No.6, 2014, pp.10081-10106.
DOI
|
4 |
Khan, Muhammad Khurram, and Khaled Alghathbar, "Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'," Sensors, Vol.10, No.3, 2010, pp.2450-2459.
DOI
|
5 |
Das, Manik Lal, "Two-factor user authentication in wireless sensor networks," IEEE transactions on wireless communications Vol.8, No.3, 2009, pp.1086-1090.
DOI
|
6 |
Chaudhry, Shehzad Ashraf, et al, "An improved and provably secure privacy preserving authentication protocol for SIP," Peer-to-Peer Networking and Applications, Vol.10, No.1, 2017, pp.1-15.
DOI
|
7 |
He, Daojing, et al, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad hoc & sensor wireless networks, Vol.10, No.4, 2010, pp.361-371.
|
8 |
Yeh, Hsiu-Lien, et al, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, Vol.11, No.5, 2011, pp.4767-4779.
DOI
|
9 |
Shi, Wenbo, and Peng Gong, "A new user authentication protocol for wireless sensor networks using elliptic curves cryptography," International Journal of Distributed Sensor Networks, Vol.9, No.4, 2013.
|
10 |
Chen, Tien‐Ho, and Wei‐Kuan Shih, "A robust mutual authentication protocol for wireless sensor networks," ETRI journal, Vol.32, No.5, 2010, pp.704-712.
DOI
|
11 |
Choi, Younsung, Youngsook Lee, and Dongho Won, "Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction," International Journal of Distributed Sensor Networks, Vol.12, No.1, 2016.
|
12 |
Wang, Ding, et al, "Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment," IEEE Transactions on Dependable and Secure Computing, Vol.12, No.4, 2014, pp.428-442.
DOI
|
13 |
Hankerson, Darrel, Alfred J. Menezes, and Scott Vanstone, "Guide to elliptic curve cryptography," Computing Reviews, Vol.46, No.1, 2005.
|
14 |
Choi, Younsung, et al, "Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics," The Scientific World Journal, 2014.
|
15 |
Jung, Jaewook, et al, "An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks," Sensors, Vol.16, No.8, 2016.
|
16 |
박중오, "무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계", 디지털산업정보학회 논문지, 제15권, 제2호, 2019, pp.43-52.
|
17 |
이재영, "스마트카드 기반의 사용자 인증 기법에 관한 연구", 디지털산업정보학회 논문지, 제14권, 제2호, 2018, pp.27-33.
|