These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
132 related articles for article (PubMed ID: 24984058)
1. A trustworthy key generation prototype based on DDR3 PUF for wireless sensor networks. Liu W; Zhang Z; Li M; Liu Z Sensors (Basel); 2014 Jun; 14(7):11542-56. PubMed ID: 24984058 [TBL] [Abstract][Full Text] [Related]
2. An Anti-Electromagnetic Attack PUF Based on a Configurable Ring Oscillator for Wireless Sensor Networks. Lu Z; Li D; Liu H; Gong M; Liu Z Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28914756 [TBL] [Abstract][Full Text] [Related]
3. A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes. Arjona R; Prada-Delgado MÁ; Arcenegui J; Baturone I Sensors (Basel); 2018 Jul; 18(8):. PubMed ID: 30049967 [TBL] [Abstract][Full Text] [Related]
4. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. Cao Y; Zhao X; Ye W; Han Q; Pan X Sensors (Basel); 2018 Jan; 18(2):. PubMed ID: 29360790 [TBL] [Abstract][Full Text] [Related]
5. Simulation of Attacks for Security in Wireless Sensor Network. Diaz A; Sanchez P Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710 [TBL] [Abstract][Full Text] [Related]
6. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. V AD; V K Pers Ubiquitous Comput; 2023; 27(3):875-885. PubMed ID: 33758585 [TBL] [Abstract][Full Text] [Related]
7. Highly Secure Physically Unclonable Cryptographic Primitives Based on Interfacial Magnetic Anisotropy. Chen H; Song M; Guo Z; Li R; Zou Q; Luo S; Zhang S; Luo Q; Hong J; You L Nano Lett; 2018 Nov; 18(11):7211-7216. PubMed ID: 30365330 [TBL] [Abstract][Full Text] [Related]
8. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874 [TBL] [Abstract][Full Text] [Related]
9. Securing Cryptographic Chips against Scan-Based Attacks in Wireless Sensor Network Applications. Wang W; Deng Z; Wang J; Sangaiah AK; Cai S; Almakhadmeh Z; Tolba A Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31652631 [TBL] [Abstract][Full Text] [Related]
10. Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks. Najafi F; Kaveh M; Martín D; Reza Mosavi M Sensors (Basel); 2021 Mar; 21(6):. PubMed ID: 33809161 [TBL] [Abstract][Full Text] [Related]
11. Cryptanalysis and Improvement of a Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks. Renuka K; Kumar S; Kumari S; Chen CM Sensors (Basel); 2019 Oct; 19(21):. PubMed ID: 31653025 [TBL] [Abstract][Full Text] [Related]
12. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Shaukat HR; Hashim F; Shaukat MA; Ali Alezabi K Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32316487 [TBL] [Abstract][Full Text] [Related]
13. Providing self-healing ability for wireless sensor node by using reconfigurable hardware. Yuan S; Qiu L; Gao S; Tong Y; Yang W Sensors (Basel); 2012 Oct; 12(11):14570-91. PubMed ID: 23202176 [TBL] [Abstract][Full Text] [Related]
14. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks. Osanaiye O; Alfa AS; Hancke GP Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29794994 [TBL] [Abstract][Full Text] [Related]
15. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Kim J; Lee D; Jeon W; Lee Y; Won D Sensors (Basel); 2014 Apr; 14(4):6443-62. PubMed ID: 24721764 [TBL] [Abstract][Full Text] [Related]
16. Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices. Chen S; Li B; Cao Y Sensors (Basel); 2019 May; 19(11):. PubMed ID: 31141896 [TBL] [Abstract][Full Text] [Related]
17. A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs. Shi Y; Wei W; He Z Sensors (Basel); 2015 May; 15(5):11928-52. PubMed ID: 26007737 [TBL] [Abstract][Full Text] [Related]
18. Distributed clone detection in static wireless sensor networks: random walk with network division. Khan WZ; Aalsalem MY; Saad NM PLoS One; 2015; 10(5):e0123069. PubMed ID: 25992913 [TBL] [Abstract][Full Text] [Related]