TY - BOOK AU - Kenneth, N. C. AU - Viktor, M. S. PY - 2013 DA - 2013// TI - The rise of big data: how It’s changing the way we think about the world. Fortuna’s Corner in cloud computing, Cybersecurity, Dow, Intelligence Community, Internet, Markets, national security, S & P, Uncategorized, US Military, April 24, 2013 ID - Kenneth2013 ER - TY - STD TI - Sastry N, Wagner D (2004) Security considerations for IEEE 802.15.4 networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe’04). 32–42 ID - ref2 ER - TY - BOOK PY - 2003 DA - 2003// TI - IEEE Standards for 802.15.4, Part 15, Amendment 4. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks PB - IEEE CY - Washington, DC, USA ID - ref3 ER - TY - JOUR AU - Das, M. L. AU - Saxena, A. AU - Gulati, V. P. PY - 2004 DA - 2004// TI - A dynamic ID-based remote user authentication scheme JO - IEEE Trans Consum Electron VL - 50 UR - https://doi.org/10.1109/TCE.2004.1309441 DO - 10.1109/TCE.2004.1309441 ID - Das2004 ER - TY - JOUR AU - Leung, K. C. AU - Cheng, L. M. AU - Fong, A. S. AU - Chan, C. K. PY - 2003 DA - 2003// TI - Cryptanalysis of a modified remote user authentication scheme using smart cards JO - IEEE Trans Consum Electron VL - 49 UR - https://doi.org/10.1109/TCE.2003.1261224 DO - 10.1109/TCE.2003.1261224 ID - Leung2003 ER - TY - STD TI - Watro R, Kong D, Cuti S F, Gardiner C, Lynn C, Kruus P (2004) TinyPK: securing sensor networks with public key technology. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’04), 59–64 ID - ref6 ER - TY - STD TI - Benenson Z, Gedicke N, Raivio O (2005) Realizing robust user authentication in sensor networks. In Real-World Wireless Sensor Networks (REALWSN), 14 ID - ref7 ER - TY - STD TI - Wong KHM, Yuan Z, Jiannong C, Shengwei W (2006) A dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 244-251 ID - ref8 ER - TY - STD TI - Tseng HR, Jan RH, Yang W (2007) An improved dynamic user authentication scheme for wireless sensor networks. In Proceedings of the 50th Annual IEEE Global Telecommunications Conference (GLOBECOM’07), 986–990 ID - ref9 ER - TY - JOUR AU - Das, M. L. PY - 2009 DA - 2009// TI - Two-factor user authentication in wireless sensor networks JO - IEEE Trans Wirel Commun VL - 8 UR - https://doi.org/10.1109/TWC.2008.080128 DO - 10.1109/TWC.2008.080128 ID - Das2009 ER - TY - STD TI - Ko KC (2008) A novel dynamic user authentication scheme for wireless sensor networks. In Proceedings of the IEEE International Symposium on Wireless Communication Systems, ISWCS’08, 608–612 ID - ref11 ER - TY - STD TI - Nyang DH, Lee MK (2009) Improvement of Das’s two-factor authentication protocol in wireless sensor networks. Available via DIALOG. http://eprint.iacr.org/2009/631.pdf. Accessed 15 Jan 2014. UR - http://eprint.iacr.org/2009/631.pdf ID - ref12 ER - TY - JOUR AU - Vaidya, B. AU - Rodrigues, J. J. AU - Park, J. H. PY - 2010 DA - 2010// TI - User authentication schemes with pseudonymity for ubiquitous sensor network in NGN JO - Int J Communication Syst VL - 23 UR - https://doi.org/10.1002/dac.1097 DO - 10.1002/dac.1097 ID - Vaidya2010 ER - TY - JOUR AU - Khan, M. K. AU - Alghathbar, K. PY - 2010 DA - 2010// TI - Cryptanalysis and security improvements of ‘two-factor user authentication in wireless sensor networks’ JO - Sensors VL - 10 UR - https://doi.org/10.3390/s100302450 DO - 10.3390/s100302450 ID - Khan2010 ER - TY - STD TI - Khan MK, Alghathbar K (2010), Security Analysis of Two-Factor Authentication In Wireless Sensor Networks. In Proceedings of Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, 55–60 ID - ref15 ER - TY - JOUR AU - Chen, T. H. AU - Shih, W. K. PY - 2010 DA - 2010// TI - A robust mutual authentication protocol for wireless sensor networks JO - ETRI J VL - 32 UR - https://doi.org/10.4218/etrij.10.1510.0134 DO - 10.4218/etrij.10.1510.0134 ID - Chen2010 ER - TY - JOUR AU - Yeh, H. L. AU - Chen, T. H. AU - Liu, P. C. AU - Kim, T. H. AU - Wei, H. W. PY - 2011 DA - 2011// TI - A secured authentication protocol for wireless sensor networks using elliptic curves cryptography JO - Sensors VL - 11 UR - https://doi.org/10.3390/s110504767 DO - 10.3390/s110504767 ID - Yeh2011 ER - TY - STD TI - Han W (2013), Weakness of a secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Available via DIALOG. http://eprint.iacr.org/2011/293. Accessed 15 May 2014. UR - http://eprint.iacr.org/2011/293 ID - ref18 ER - TY - JOUR AU - Yuan, J. AU - Jiang, C. AU - Jiang, Z. PY - 2010 DA - 2010// TI - A biometric-based user authentication for wireless sensor networks JO - Wuhan Univ J Nat Sci VL - 15 UR - https://doi.org/10.1007/s11859-010-0318-2 DO - 10.1007/s11859-010-0318-2 ID - Yuan2010 ER - TY - STD TI - Yoon EJ, Yoo K Y(2011) A new biometric-based user authentication scheme without using password for wireless sensor networks. In Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 279–284 ID - ref20 ER - TY - JOUR AU - Ohood, A. AU - Mznah, A. R. AU - Abdullah, A. D. PY - 2013 DA - 2013// TI - An efficient biometric authentication protocol for wireless sensor networks JO - Int J Distributed Sensor Networks VL - 4 ID - Ohood2013 ER - TY - JOUR AU - Wenbo, S. AU - Peng, G. PY - 2013 DA - 2013// TI - A new user authentication protocol for wireless sensor networks using elliptic curves cryptography JO - Int J Distrib Sens Netw VL - 3 ID - Wenbo2013 ER - TY - BOOK AU - Quan, Z. PY - 2011 DA - 2011// TI - Trusted transmission model of wireless sensor networks PB - South China Agricultural University CY - China ID - Quan2011 ER - TY - STD TI - Quan Z, Gui F, Deqin X, Jiuhao L (2010) trusted transport model based cluster-merkle-tree for WSNs. in Processing of 2010 IEEE International Conference on Computer Application and System Modeling V1, 564 -568 ID - ref24 ER - TY - STD TI - Quan Z, GUI F, Deqin X, Yi T (2012) Trusted architecture for farmland WSNs. in Processing of 2012 Forth IEEE International Conference on Cloud Computing Technology and Science, 782–787 ID - ref25 ER - TY - JOUR AU - Boneh, D. AU - Franklin, M. PY - 2001 DA - 2001// TI - Identity based encryption from the Weil pairing. in processing of Advances in Cryptology JO - Lect Notes Computer Sci VL - 2139 UR - https://doi.org/10.1007/3-540-44647-8_13 DO - 10.1007/3-540-44647-8_13 ID - Boneh2001 ER -