Sign in

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.

Ding WangPing Wang
Published in: Comput. Networks (2014)
Keyphrases
  • wireless sensor networks
  • factor authentication
  • data publishing
  • energy consumption
  • sensor nodes
  • wireless communication
  • resource constrained
  • multimedia
  • sensor networks
  • routing protocol