최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.8, 2020년, pp.119387 - 119404
Park, Kisung (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) , Noh, Sungkee (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) , Lee, Hyunjin (Electronics and Telecommunications Research Institute, Blockchain Technology Research Center, Daejeon, South Korea) , Das, Ashok Kumar (International Institute of Information Technology, Center for Security, Theory, and Algorithmic Research, Hyderabad, India) , Kim, Myeonghyun (Kyungpook National University, School of Electronics Engineering, Daegu, South Korea) , Park, Youngho (Kyungpook National University, School of Electronics Engineering, Daegu, South Korea) , Wazid, Mohammad (Graphic Era Deemed to be University, Dehradun, India)
Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical services by exchanging physiological data between user and medical...
Chin-Chen Chang, Hai-Duong Le. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks. IEEE transactions on wireless communications, vol.15, no.1, 357-366.
Turkanovic, M., Brumen, B., Holbl, M.. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad hoc networks, vol.20, 96-112.
Barman, Subhas, Das, Ashok Kumar, Samanta, Debasis, Chattopadhyay, Samiran, Rodrigues, Joel J. P. C., Park, Youngho. Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment. IEEE access : practical research, open solutions, vol.6, 38578-38594.
Abdalla, M., Fouque, P.-A., Pointcheval, D.. Password-Based Authenticated Key Exchange in the Three-Party Setting. Lecture notes in computer science, vol.3386, 65-84.
Dolev, D., Yao, A.. On the security of public key protocols. IEEE transactions on information theory, vol.29, no.2, 198-208.
Xu, Zisang, Xu, Cheng, Liang, Wei, Xu, Jianbo, Chen, Haixian. A Lightweight Mutual Authentication and Key Agreement Scheme for Medical Internet of Things. IEEE access : practical research, open solutions, vol.7, 53922-53931.
Automated Validation of Internet Security Protocols and Applications 2019
Burrows, Michael, Abadi, Martin, Needham, Roger. A logic of authentication. ACM transactions on computer systems, vol.8, no.1, 18-36.
Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Khan, Muhammad Khurram, Choo, Kim-Kwang Raymond, Park, YoungHo. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment. IEEE journal of biomedical and health informatics, vol.22, no.4, 1310-1322.
Park, Kisung, Park, Youngho, Das, Ashok Kumar, Yu, Sungjin, Lee, Joonyoung, Park, Yohan. A Dynamic Privacy-Preserving Key Management Protocol for V2G in Social Internet of Things. IEEE access : practical research, open solutions, vol.7, 76812-76832.
Li, Xiong, Ibrahim, Maged Hamada, Kumari, Saru, Sangaiah, Arun Kumar, Gupta, Vidushi, Choo, Kim-Kwang Raymond. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Computer networks, vol.129, no.2, 429-443.
Ibrahim, M.H., Kumari, S., Das, A.K., Wazid, M., Odelu, V.. Secure anonymous mutual authentication for star two-tier wireless body area networks. Computer methods and programs in biomedicine, vol.135, 37-50.
Li, Xiong, Niu, Jianwei, Kumari, Saru, Wu, Fan, Choo, Kim-Kwang Raymond. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future generation computer systems : FGCS, vol.83, 607-618.
Zimmerman, T. G.. Personal Area Networks: Near-field intrabody communication. IBM systems journal, vol.35, no.3, 609-617.
More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things van der meulen 2016
Ad Hoc Sensor Wireless Netw An enhanced access control scheme in wireless sensor networks chatterjee 2014 21 121
Srinivas, Jangirala, Das, Ashok Kumar, Kumar, Neeraj, Rodrigues, Joel J. P. C.. Cloud Centric Authentication for Wearable Healthcare Monitoring System. IEEE transactions on dependable and secure computing, vol.17, no.5, 942-956.
Wazid, Mohammad, Das, Ashok Kumar, Kumari, Saru, Li, Xiong, Wu, Fan. Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS. Security and communication networks, vol.9, no.13, 1983-2001.
Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE transactions on parallel and distributed systems : a publication of the IEEE Computer Society, vol.25, no.2, 332-342.
Odelu, Vanga, Das, Ashok Kumar, Goswami, Adrijit. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE transactions on consumer electronics, vol.62, no.1, 30-38.
Xu, Zisang, Xu, Cheng, Chen, Haixian, Yang, Fang. A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and computation : practice & experience, vol.31, no.14, e5295-.
Zhao, Zhenguo. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. Journal of medical systems, vol.38, no.2, 13-.
The Network Simulator-ns-2 2020
Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Vasilakos, Athanasios V.. Design of secure key management and user authentication scheme for fog computing services. Future generation computer systems : FGCS, vol.91, 475-492.
Chen, Chien-Ming, Wang, King-Hang, Yeh, Kuo-Hui, Xiang, Bin, Wu, Tsu-Yang. Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. Journal of ambient intelligence and humanized computing, vol.10, no.8, 3133-3142.
Li, C.T., Hwang, M.S., Chu, Y.P.. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer communications, vol.31, no.12, 2803-2814.
Chandrakar, P., Om, H.. A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Computer communications, vol.110, 26-34.
Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho. AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.6, no.5, 8804-8817.
Das, Ashok Kumar. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. International journal of communication systems, vol.30, no.1, e2933-.
Chen, Ying, Ge, Yangming, Wang, Yerong, Zeng, Zhuang. An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks. IEEE access : practical research, open solutions, vol.7, 85440-85451.
Li, Xiong, Peng, Jieyao, Niu, Jianwei, Wu, Fan, Liao, Junguo, Choo, Kim-Kwang Raymond. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.5, no.3, 1606-1615.
Lee, JoonYoung, Yu, SungJin, Park, KiSung, Park, YoHan, Park, YoungHo. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments. Sensors, vol.19, no.10, 2358-.
Challa, Sravani, Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Goutham Reddy, Alavalapati, Yoon, Eun-Jun, Yoo, Kee-Young. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE access : practical research, open solutions, vol.5, 3028-3043.
Wazid, Mohammad, Das, Ashok Kumar, Hussain, Rasheed, Succi, Giancarlo, Rodrigues, Joel J.P.C.. Authentication in cloud-driven IoT-based big data environment: Survey and outlook. Journal of systems architecture : JSA : the Euromicro journal, vol.97, 185-196.
Das, Ashok Kumar, Wazid, Mohammad, Kumar, Neeraj, Vasilakos, Athanasios V., Rodrigues, Joel J. P. C.. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.5, no.6, 4900-4913.
Odelu, Vanga, Das, Ashok Kumar, Khurram Khan, Muhammad, Choo, Kim-Kwang Raymond, Jo, Minho. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts. IEEE access : practical research, open solutions, vol.5, 3273-3283.
Das, Ashok Kumar, Wazid, Mohammad, Yannam, Animi Reddy, Rodrigues, Joel J. P. C., Park, Youngho. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment. IEEE access : practical research, open solutions, vol.7, 55382-55397.
Wazid, Mohammad, Das, Ashok Kumar, Odelu, Vanga, Kumar, Neeraj, Susilo, Willy. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE transactions on dependable and secure computing, vol.17, no.2, 391-406.
Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Odelu, Vanga, Goutham Reddy, Alavalapati, Park, Kisung, Park, Youngho. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks. IEEE access : practical research, open solutions, vol.5, 14966-14980.
Das, M.L., Saxena, A., Gulati, V.P.. A dynamic ID-based remote user authentication scheme. IEEE transactions on consumer electronics, vol.50, no.2, 629-631.
Lamport, Leslie. Password authentication with insecure communication. Communications of the ACM, vol.24, no.11, 770-772.
Amin, Ruhul, Islam, SK Hafizul, Biswas, G.P., Khan, Muhammad Khurram, Kumar, Neeraj. A robust and anonymous patient monitoring system using wireless medical sensor networks. Future generation computer systems : FGCS, vol.80, 483-495.
Park, Kisung, Park, Youngho, Park, Yohan, Goutham Reddy, Alavalapati, Das, Ashok Kumar. Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks. IEEE access : practical research, open solutions, vol.5, 25110-25125.
Wang, Chenyu, Wang, Ding, Xu, Guoai, Guo, Yanhui. A lightweight password‐based authentication protocol using smart card. International journal of communication systems, vol.30, no.16, e3336-.
Kumari, Saru, Khan, Muhammad Khurram, Li, Xiong. A more secure digital rights management authentication scheme based on smart card. Multimedia tools and applications, vol.75, no.2, 1135-1158.
AVISPA SPAN the Security Protocol Animator for AVISPA 2020
Chen, Chien-Ming, Xiang, Bin, Liu, Yining, Wang, King-Hang. A Secure Authentication Protocol for Internet of Vehicles. IEEE access : practical research, open solutions, vol.7, 12047-12057.
Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian. Zipf’s Law in Passwords. IEEE transactions on information forensics and security, vol.12, no.11, 2776-2791.
Automated Validation of Internet Security Protocols and Applications 2006
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE transactions on dependable and secure computing, vol.12, no.4, 428-442.
Gope, P., Hwang, T.. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of network and computer applications, vol.62, 1-8.
Messerges, T.S., Dabbish, E.A., Sloan, R.H.. Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers, vol.51, no.5, 541-552.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.