Login / Signup
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Ding Wang
Ping Wang
Published in:
Comput. Networks (2014)
Keyphrases
</>
wireless sensor networks
factor authentication
data publishing
energy consumption
sensor nodes
wireless communication
resource constrained
multimedia
sensor networks
routing protocol