Format
Items per page
Sort by

Send to:

Choose Destination

Links from PubMed

Items: 1 to 20 of 151

1.

An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications.

Kumar P, Ylianttila M, Gurtov A, Lee SG, Lee HJ.

Sensors (Basel). 2014 Feb 11;14(2):2732-55. doi: 10.3390/s140202732.

2.

RUASN: a robust user authentication framework for wireless sensor networks.

Kumar P, Choudhury AJ, Sain M, Lee SG, Lee HJ.

Sensors (Basel). 2011;11(5):5020-46. doi: 10.3390/s110505020. Epub 2011 May 4.

3.

E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

Kumar P, Lee SG, Lee HJ.

Sensors (Basel). 2012;12(2):1625-47. doi: 10.3390/s120201625. Epub 2012 Feb 7.

4.

Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

Kim J, Lee D, Jeon W, Lee Y, Won D.

Sensors (Basel). 2014 Apr 9;14(4):6443-62. doi: 10.3390/s140406443.

5.

Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.

Chang IP, Lee TF, Lin TH, Liu CM.

Sensors (Basel). 2015 Nov 30;15(12):29841-54. doi: 10.3390/s151229767.

6.

Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

Khan MK, Alghathbar K.

Sensors (Basel). 2010;10(3):2450-9. doi: 10.3390/s100302450. Epub 2010 Mar 23.

7.

An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

Lu Y, Li L, Peng H, Yang Y.

Sensors (Basel). 2016 Jun 8;16(6). pii: E837. doi: 10.3390/s16060837.

PMID:
27338382
8.

An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

Li CT, Weng CY, Lee CC.

Sensors (Basel). 2013 Jul 24;13(8):9589-603. doi: 10.3390/s130809589.

9.

Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

Nam J, Choo KK, Han S, Kim M, Paik J, Won D.

PLoS One. 2015 Apr 7;10(4):e0116709. doi: 10.1371/journal.pone.0116709. eCollection 2015.

10.

Efficient security mechanisms for mHealth applications using wireless body sensor networks.

Sahoo PK.

Sensors (Basel). 2012;12(9):12606-33. doi: 10.3390/s120912606. Epub 2012 Sep 17.

11.

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

Amin R, Islam SK, Biswas GP, Khan MK, Obaidat MS.

J Med Syst. 2015 Nov;39(11):137. doi: 10.1007/s10916-015-0307-2. Epub 2015 Sep 1.

PMID:
26324169
12.

A provably-secure ECC-based authentication scheme for wireless sensor networks.

Nam J, Kim M, Paik J, Lee Y, Won D.

Sensors (Basel). 2014 Nov 6;14(11):21023-44. doi: 10.3390/s141121023.

13.

Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

Park N, Kang N.

Sensors (Basel). 2015 Dec 24;16(1). pii: E20. doi: 10.3390/s16010020.

14.

Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

An Y.

J Biomed Biotechnol. 2012;2012:519723. doi: 10.1155/2012/519723. Epub 2012 Jul 31.

15.

On securing wireless sensor network--novel authentication scheme against DOS attacks.

Raja KN, Beno MM.

J Med Syst. 2014 Oct;38(10):84. doi: 10.1007/s10916-014-0084-3. Epub 2014 Aug 9.

PMID:
25106827
16.

A more secure anonymous user authentication scheme for the integrated EPR information system.

Wen F.

J Med Syst. 2014 May;38(5):42. doi: 10.1007/s10916-014-0042-0. Epub 2014 Apr 24.

PMID:
24760224
17.

A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

Chen H, Ge L, Xie L.

Sensors (Basel). 2015 Jul 14;15(7):17057-75. doi: 10.3390/s150717057.

18.

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

Rajeswari SR, Seenivasagam V.

ScientificWorldJournal. 2016;2016:6854303. doi: 10.1155/2016/6854303. Epub 2016 Jan 13. Review.

19.
20.

A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

Yeh HL, Chen TH, Liu PC, Kim TH, Wei HW.

Sensors (Basel). 2011;11(5):4767-79. doi: 10.3390/s110504767. Epub 2011 May 2.

Format
Items per page
Sort by

Send to:

Choose Destination

Supplemental Content

Write to the Help Desk