%PDF-1.7
%
2 0 obj
<<
/Type /Catalog
/Names 4 0 R
/Pages 5 0 R
/Threads 6 0 R
/Metadata 7 0 R
/Outlines 8 0 R
/PageMode /UseOutlines
/OpenAction [9 0 R /FitH 753]
/PageLabels 10 0 R
/PageLayout /SinglePage
/StructTreeRoot 11 0 R
>>
endobj
7 0 obj
<<
/Type /Metadata
/Length 6416
/Subtype /XML
>>
stream
application/pdf
doi:10.1016/j.comnet.2014.07.010
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang
Ping Wang
Two-factor authentication
Wireless sensor networks
User anonymity
Smart card
Non-tamper resistant
COMPUTER NETWORKS, 73 (2014) 41-57. doi:10.1016/j.comnet.2014.07.010
Elsevier B.V.
journal
COMPUTER NETWORKS
Copyright © 2014 Elsevier B.V. All rights reserved.
1389-1286
73
C
14 November 2014
2014-11-14
41-57
41
57
10.1016/j.comnet.2014.07.010
http://dx.doi.org/10.1016/j.comnet.2014.07.010
2010-04-23
true
10.1016/j.comnet.2014.07.010
elsevier.com
sciencedirect.com
6.4
10.1016/j.comnet.2014.07.010
noindex
2010-04-23
true
elsevier.com
sciencedirect.com
sciencedirect.com
elsevier.com
Elsevier
2014-08-26T11:44:55+05:30
2017-11-08T21:14:55+08:00
2014-08-26T11:46:21+05:30
True
Acrobat Distiller 8.0.0 (Windows)
uuid:329276ca-d58b-4965-bddd-04bbf3251601
uuid:300b3ad7-df24-4540-979b-cd97887606c5
endstream
endobj
58 0 obj
<<
/Filter [/FlateDecode]
/Length 931
>>
stream
HlUnI}A_Vi!],;=Tx;:uTog-oa%/wr.)H2&D/%\.ƙ*N$줶w3<'"ٔODhR~xwZjKe_;M҇H'[^|i>/f:
[W,]{>nnvl}kwvyX*m1#3M&iכQ|swnG2CE9/fXXpX?U<7?]tU#1ajnVn%ji$qn}{Z_B˵JEVxei3q6NLZ?nޣШ R+y%|Ur%~Q:(OݖnQ1L_|
<ΕkLG14g.yxRrf(2i #tM+kx2R:ّn9G@1¢Qt+*d|:CJ[@U;mEo w
R"^BӕlĚxH)*P (x@JqbHrBÔLT5eˆQ2x
TXVa
ClG"
IOf"B"raYMK1ٚqAC`dH[53OvJat)fp\@ơfNҥӘB5$+[itHOTX]ԓaMÂLPBɪvr@fS*`eL|Y}vQc/
VV?
endstream
endobj
59 0 obj
<<
/Filter [/FlateDecode]
/Length 694
>>
stream
HUK9}O1gx@0E"?1 U-6*$bk 5Ą=!X
Y2Z jCF#je('2m.}%>!QeV $#lhxMUvlp9O|ԟ_1kcX34
qykQ;o^YV_Mv-籓79 6Vޙ2 Y|
endstream
endobj
60 0 obj
<<
/Filter [/FlateDecode]
/Length 863
>>
stream
HUMoGz_1
,9@
$p99ەJGM1 'gBV;y=G1}7: Dג;EINH*zfڌqMtDDA. Mؚ