Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 22 publications
0
3
0
Order By: Relevance
“…They also proposed a destructive private authentication protocol for RFID systems. Furthermore, recently, several new authentication mechanisms based on PUF functions have been proposed in order to enhance their security and privacy levels .…”
Section: Preliminariesmentioning
confidence: 99%
“…They also proposed a destructive private authentication protocol for RFID systems. Furthermore, recently, several new authentication mechanisms based on PUF functions have been proposed in order to enhance their security and privacy levels .…”
Section: Preliminariesmentioning
confidence: 99%
“…An authentication and key agreement scheme for WSNs comprises users, sensor nodes and a gateway node (GWN), and enables a user and sensor nodes to realize mutual authentication and to negotiate a common secret key via the help of the GWN. The legitimate user and sensor nodes then establish a secure and authentication channel [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 ], as shown in Figure 1 . A password-based authentication and key agreement scheme only uses a weak password for user authentication, and is the most convenient authentication method.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the user and the each sensor node negotiate a common secret key with the help of GWN to establish a secure and authentication channel in the WSN. Finally, the password change phase enables users to update their passwords for increased security [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%