Mostrando 2 resultados de: 2
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus