[HTML][HTML] An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - mdpi.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

J Jung, J Kim, Y Choi, D Won - Sensors (Basel, Switzerland), 2016 - europepmc.org
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

J Jung, J Kim, Y Choi, D Won - Sensors (14248220), 2016 - search.ebscohost.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

[PDF][PDF] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - pdfs.semanticscholar.org
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - SENSORS, 2016 - scholarworks.bwise.kr
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - search.proquest.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

[HTML][HTML] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - Sensors (Basel, Switzerland), 2016 - ncbi.nlm.nih.gov
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

[引用][C] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - ui.adsabs.harvard.edu
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric
Cryptosystem in Wireless Sensor Networks - NASA/ADS Now on home page ads icon ads …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

J Jung, J Kim, Y Choi, D Won - Sensors (Basel …, 2016 - pubmed.ncbi.nlm.nih.gov
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

J Jung, J Kim, Y Choi, D Won - Sensors (14248220), 2016 - search.ebscohost.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …