Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks (English)
- New search for: Wang, Ding
- New search for: Wang, Ping
- New search for: Wang, Ding
- New search for: Wang, Ping
In:
Ad Hoc Networks
;
20
;
1-15
;
2014
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
Contributors:Wang, Ding ( author ) / Wang, Ping ( author )
-
Published in:Ad Hoc Networks ; 20 ; 1-15
-
Publisher:
- New search for: Elsevier B.V.
-
Publication date:2014-03-11
-
Size:15 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 20
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networksWang, Ding / Wang, Ping et al. | 2014
- 16
-
Design of a generic management system for wireless sensor networksCao, Trang Minh / Bellata, Boris / Oliver, Miquel et al. | 2014
- 36
-
A novel range-free localization algorithm to turn connectivity traces and motion data into localization informationCabero, José María / Olabarrieta, Ignacio (Iñaki) / Gil-López, Sergio / Ser, Javier Del / Martín, José Luis et al. | 2014
- 53
-
Link availability estimation based reliable routing for aeronautical ad hoc networksLei, Lei / Wang, Dan / Zhou, Liang / Chen, Xiaoming / Cai, Shengsuo et al. | 2014
- 64
-
Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interferenceUyanik, Gulnur Selda / Abdel-Rahman, Mohammad J. / Krunz, Marwan et al. | 2014
- 77
-
A hybrid MAC protocol for emergency response wireless sensor networksSitanayah, Lanny / Sreenan, Cormac J. / Brown, Kenneth N. et al. | 2014
- 96
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notionTurkanović, Muhamed / Brumen, Boštjan / Hölbl, Marko et al. | 2014
- 113
-
On convexification of range measurement based sensor and source localization problemsFidan, Barış / Kiraz, Fatma et al. | 2014
- 119
-
Network coding versus traditional routing in adversarial wireless networksZhu, Donghai / Yang, Xinyu / Yu, Wei / Fu, Xinwen et al. | 2014
- 132
-
Economy driven content dissemination in Delay Tolerant NetworksHajiaghajani, Faezeh / Piolet Thulasidharan, Yogesh / Taghizadeh, Mahmoud / Biswas, Subir et al. | 2014
- 150
-
A distributed routing for wireless sensor networks with mobile sink based on the greedy embeddingJiang, Yisong / Shi, Weiren / Wang, Xiaogang / Li, Hongbing et al. | 2014
- 163
-
SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networksNovales, Ramon L. / Mittal, Neeraj / Sarac, Kamil et al. | 2014
- 182
-
Comparison of optimization algorithms in the sensor selection for predictive target trackingPino-Povedano, Sara / González-Serrano, Francisco-Javier et al. | 2014
- IFC
-
Inside Front Cover - Editorial Board| 2014