[PDF][PDF] 基于智能卡和密码保护的WSN 远程用户安全认证方案

刘丽萍 - 电信科学, 2015 - infocomm-journal.com
针对无线传感器网络(WSN) 用户远程安全认证问题, 分析现有方案的不足, 提出一种新颖的基于
智能卡的WSN 远程用户认证方案. 通过用户, 网关节点和传感器节点之间的相互认证来验证用户 …

Cryptographie sur les courbes elliptiques et tolérance aux pannes dans les réseaux de capteurs

Y Shou - 2014 - theses.hal.science
L'émergence des systèmes embarqués a permis le développement des réseaux de
capteurs sans fil dans de nombreux domaines différents. Cependant, la sécurité reste un …

Multi-User Broadcast Authentication Protocol in Wireless Sensor Networks against DoS Attack

J Xu, L Dang - The Open Cybernetics & Systemics Journal, 2014 - benthamopen.com
In order to achieve the multi-user broadcast authentication in WSNs (Wireless Sensor
Networks) defending against DoS (Denial-of-Service) attack, a multi-user broadcast …

A comparison of differential addition and doubling in binary edwards curves for elliptic curve cryptography

CA Lara-Nino, A Diaz-Perez… - 2021 Fifth World …, 2021 - ieeexplore.ieee.org
Binary Edwards curves (BEC) over finite fields can be used as an additive cyclic elliptic
curve group to enable elliptic curve cryptography (ECC), where the most time consuming is …

Secure and efficient ECC: Radix-16 scalar multiplication without pre-computation

G Kumar, H Saini - Proceedings of the International Conference on Big …, 2016 - dl.acm.org
The use of Elliptic curve cryptography (ECC) is widely playing a crucial role and is reporting
with a great hope of advancing security and performance related benefits for the high end …

Accelerated precomputation points–based scalar reduction on elliptic curve cryptography for wireless sensor networks

Y Faye, H Guyennet, S Yanbo… - International Journal of …, 2017 - Wiley Online Library
Sensor devices are limited resource power and energy, thus providing security services for
sensor networks is very difficult. Elliptic curve cryptography (ECC) is one of the most famous …

A Survey of Fast Scalar Multiplication on Elliptic Curve Cryptography for Lightweight Embedded Devices

Y Faye, H Guyennet, I Niang - Modern Cryptography-Current …, 2019 - books.google.com
Elliptic curve cryptography (ECC) is one of the most famous asymmetric cryptographic
schemes which offers the same level of security with much shorter keys than the other widely …

Privacy preserving two-server Diffie-Hellman key exchange protocol

D Chattaraj, M Sarma, D Samanta - Proceedings of the 10th International …, 2017 - dl.acm.org
For a secure communication over an insecure channel the Diffie-Hellman key exchange
protocol (DHKEP) is treated as the de facto standard. However, it suffers form server-side …

Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication

G Kumar, H Saini, UM Fernandes Dimlo - … India, April 20-21, 2018, Revised …, 2018 - Springer
Abstract An Elliptic Curve Cryptography (ECC) algorithm is one of the most powerful with
respect to better security and performance than RSA algorithm. Most of applications prefer to …