:::

詳目顯示

回上一頁
題名:一個增強的IoT無線感測網路遠端認證機制
書刊名:資訊管理學報
作者:余平 引用關係黃詩蓉
作者(外文):Yu, PingHuang, Shih-jung
出版日期:2020
卷期:27:1
頁次:頁111-141
主題關鍵詞:物聯網無線感測網路遠端認證安全性分析Internet of ThingsWireless sensing networkRemote authenticationSecurity analysis
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:7
期刊論文
1.Lamport, L.(1981)。Password authentication with insecure communication。Communications of the Association for Computing Machinery,24(11),770-772。  new window
2.Chang, C. C.、Wu, T. C.(1991)。Remote password authentication with smart cards。IEE Proceedings E: Computers and Digital Techniques,138(3),165-168。  new window
3.Wu, T. C.、Sung, H. S.(1996)。Authenticating Passwords over an Insecure Channel。Computer & Security,15(5),431-439。  new window
4.Yang, W. H.、Shieh, S. P.(1999)。Password Authentication Schemes with Smart Cards。Computer & Security,18(8),727-733。  new window
5.Lin, H.-Y.(2014)。Chaotic map based mobile dynamic ID authenticated key agreement scheme。Wireless Personal Communications,78(2),1487-1494。  new window
6.Farash, M. S.、Turkanović, M.、Kumari, S.、Hölbl, M.(2016)。An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment。Ad Hoc Networks,36(Part 1),152-176。  new window
7.Amin, R.、Islam, S. K. H.、Biswas, G. P.、Khan, M. K.、Leng, L.、Kumar, N.(2016)。Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks。Computer Networks,101,42-62。  new window
8.Chaudhry, S. A.、Farash, M. S.、Naqvi, H.、Kumari, S.、Khan, M. K.(2015)。An enhanced privacy preserving remote user authentication scheme with provable security。Security and Communication Networks,8(18),3782-3795。  new window
9.Chen, T. H.、Hsiang, H. C.、Shih, W. K.(2011)。Security enhancement on an improvement on two remote user authentication schemes using smart cards。Future Generation Computer Systems,27(4),377-380。  new window
10.Chien, H. Y.、Jan, J. K.、Tseng, Y. M.(2002)。An efficient and practical solution to remote authentication: Smart card。Computers & Security,21(4),372-375。  new window
11.Chuang, M. C.、Chen, M. C.(2014)。An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics。Expert Systems with Applications,41(4) Part1,1411-1418。  new window
12.Dhillon, P. K.、Kalra, S.(2017)。A lightweight biometrics based remote user authentication scheme for IoT services。Journal of Information Security and Applications,34(Part 2),255-270。  new window
13.Farash, M. S.、Chaudhry, S. A.、Heydari, M.、Sadough, S. M.、Kumari, S.、Khan, M. K.(2017)。A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security。International Journal of Communication Systems,30(4),e3019。  new window
14.Hsu, C. L.(2004)。Security of Chien et al.'s remote user authentication scheme using smart cards。Computer Standards & Interfaces,26(3),167-169。  new window
15.Islam, SK Hafizul、Obaidat, M. S.、Amin, R.(2016)。An anonymous and provably secure authentication scheme for mobile user。International Journal of Communication Systems,29(9),1529-1544。  new window
16.Jiang, Q.、Zeadally, S.、Ma, J.、He, D.(2017)。Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks。IEEE Access,5,3376-3392。  new window
17.Juang, W. S.(2004)。Efficient password authenticated key agreement using smart cards。Computers & Security,23(2),167-173。  new window
18.Karuppiah, M.、Saravanan, R.(2014)。A secure remote user mutual authentication scheme using smart cards。Journal of Information Security and Applications,19(4/5),282-294。  new window
19.Kumari, S.、Khan, M. K.、Atiquzzaman, M.(2015)。User authentication schemes for wireless sensor networks: A review。Ad Hoc Networks,27,159-194。  new window
20.Kumari, S.、Khan, M. K.、Li, X.(2014)。An improved remote user authentication scheme with key agreement。Computers & Electrical Engineering,40(6),1997-2012。  new window
21.Lee, C. C.、Lin, T. H.、Chang, R. X.(2011)。A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards。Expert Systems with Applications,38(11),13863-13870。  new window
22.Leu, J. S.、Hsieh, W. B.(2014)。Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards。IET Information Security,8(2),104-113。  new window
23.Li, C. T.、Hwang, M. S.(2010)。An efficient biometrics-based remote user authentication scheme using smart cards。Journal of Network and Computer Applications,33(1),1-5。  new window
24.Li, X.、Niu, J. W.、Ma, J.、Wang, W. D.、Liu, C. L.(2011)。Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards。Journal of Network and Computer Applications,34(1),73-79。  new window
25.Li, X.、Xiong, Y.、Ma, J.、Wang, W.(2012)。An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards。Journal of Network and Computer Applications,35(2),763-769。  new window
26.Liao, Y. P.、Wang, S. S.(2009)。A secure dynamic ID based remote user authentication scheme for multi-server environment。Computer Standards & Interfaces,31(1),24-29。  new window
27.Messerges, T. S.、Dabbish, E. A.、Sloan, R. H.(2002)。Examining smart-card security under the threat of power analysis attacks。IEEE Transactions on Computers,51(5),541-552。  new window
28.Mishra, D.、Das, A. K.、Mukhopadhyay, S.(2014)。A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards。Expert Systems with Applications,41(18),8129-8143。  new window
29.Shi, Yajuan、Shen, Han、Zhang, Yuanyuan、Chen, Jianhua(2015)。An improved anonymous remote user authentication scheme with key agreement based on dynamic identity。International Journal of Security and Its Applications,9(5),255-268。  new window
30.Shieh, W. G.、Wang J. M.(2006)。Efficient remote mutual authentication and key agreement。Computers & Security,25(1),72-77。  new window
31.Shieh, W. G.、Yu, P.(2016)。The weaknesses of karuppiah et al. S remote user mutual authentication scheme using smart card。ICIC Express Letters,10(12),2817-2822。  new window
32.Shin, S.、Yeh, H.、Kim, K.(2015)。An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks。Peer-to-Peer Networking and Applications,8(4),674-683。  new window
33.Sood, S. L.、Sarje, A. K.、Singh, K.(2011)。A secure dynamic identity based authentication protocol for multi-server architecture。Journal of Network and Computer Applications,34(2),609-618。  new window
34.Tan, K.、Zhu, H.(1999)。Remote password authentication scheme based on Cross-Product。Computer Communications,22(4),390-393。  new window
35.Tsai, J. L.(2008)。Efficient multi-server authentication scheme based on one-way hash function without verification table。Computers & Security,27(3/4),115-121。  new window
36.Tsai, J. L.、Lo, N. W.、Wu, T. C.(2013)。Novel anonymous authentication scheme using smart cards。IEEE Transactions on Industrial Informatics,9(4),2004-2013。  new window
37.Tsaur, W. J.、Li, J. H.、Lee, W. B.(2012)。An efficient and secure multi-server authentication scheme with key agreement。Journal of Systems and Software,85(4),876-882。  new window
38.Wang, D.、Ma, C. G.(2012)。Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards。The Journal of China Universities of Posts and Telecommunications,19(5),104-114。  new window
39.Wang, S. J.、Chang, J. F.(1996)。Smart card based secure password authentication scheme。Computers & Security,15(3),231-237。  new window
40.Wang, X. M.、Zhang, W. F.、Zhang, J. S.、Khan, M. K.(2007)。Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards。Computer Standards & Interfaces,29(5),507-512。  new window
41.Wen, F.、Susilo, W.、Yang, G.(2013)。A secure and effective anonymous user authentication scheme for roaming service in global mobility networks。Wireless Personal Communications,73(3),993-1004。  new window
42.Wu, F.、Li, X.、Sangaiah, A. K.、Xu, L.、Kumari, S.、Wu, L.、Shen, J.(2018)。A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks。Future Generation Computer Systems,82,727-737。  new window
43.Wu, F.、Xu, L.、Kumari, S.、Li, X.、Shen, J.、Choo, K. K. R.、Wazid, M.、Das, A. K.(2017)。An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment。Journal of Network and Computer Applications,89,72-85。  new window
44.Wu, T. C.(1995)。Remote login authentication scheme based on a geometric approach。Computer Communications,18(12),959-963。  new window
45.Yang, Y.、Wu, L.、Yin, G.、Li, L.、Zhao, H.(2017)。A survey on security and privacy issues in Internet-of-Things。IEEE Internet of Things Journal,4(5),1250-1258。  new window
會議論文
1.Kumari, S.、Khan, M. K.、Muhaya, F. B.、Kumar, R.(2013)。Cryptanalysis of a robust smart-card-based remote user password authentication scheme。The 2013 International Symposium on Biometrics and Security Technologies,(會議日期: July 2-5)。Chengdu。247-250。  new window
2.Lee, C. C.、Li, C. T.、Chen, C. L.、Chang, R. X.(2010)。On security of a more efficient and secure dynamic ID-based remote user authentication scheme。The 10th International Conference on Intelligent Systems Design and Applications,(會議日期: November 29-December 1)。Cairo, Egypt。1371-1375。  new window
3.Vijayalakshmi, P. R.、Raja, K. B.(2012)。Performance analysis of RSA and ECC in identity-based authenticated new multiparty key agreement protocol。The 2012 International Conference on Computing, Communication and Applications,(會議日期: February 22-24)。Dindigul, India。1-5。  new window
其他
1.Blanchet, B.,Smyth, B.,Cheval, V.,Sylvestre, M.(2018)。ProVerif 2.02pl1: Automatic cryptographic protocol verifier, user manual and tutorial,https://ics.upjs.sk/~jirasek/krp/manual.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE