1 |
Y. Lee, Security Analysis of a Biometric-Based User Authentication Scheme, The Korea-Society of Digital Industry& Information Management, 10(1), (2014), 81---87
|
2 |
Y. Choi, Y. Lee, D. Won, Security Improvementon Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction, International Journal of Distributed Sensor Networks Volume 2016, Article ID 8572410, 16 pages http://dx.doi.org/10.1155/2016/8572410
DOI
|
3 |
Y. Lee, Security Analysis to an Biometric Authentication Protocol for wireless Sensor Networks, The Korea-Society of Digital Industry& Information Management, 1 (1) (2015) 59-67
|
4 |
O. Althobaiti ,M. Al-Rodhaan, and A. Al-Dhelaan, An Efficient Biometric Authentication Protocol for Wireless Sensor Networks, International Journal of Distributed Sensor Networks Volume 2013, Article ID 407971, 13 pages
|
5 |
Rawat, P.; Singh, K.; Chaouchi, H.; Bonnin, J. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014, 68, 1-48.
DOI
|
6 |
Z. Cheng, Y. Lee, C. Chang, C. L, A novel biometric-based remote user authentication scheme using Quadratic Residues, International Journal of Information and Electronics Engineering, 3{4} (2013) 419-422.
|
7 |
Yuan, C. Jiang, and Z. Jiang, A biometric-based User Authentication for wireless Sensor Networks, Wuhan university journal of national sciences 5(3) (2010) 272-276.
|
8 |
E.-J. Yoon, K. Y. Yoo, A new biometric-based user authentication scheme without using password for wireless sensor networks, Proceedings of 2011 IEEE International workshops of enabling technologies: Infrastructure for collaborative enterprises, (2011) 279-284
|