Rehana Yasmin
Title
Cited by
Cited by
Year
An authentication framework for wireless sensor networks using identity-based signatures
R Yasmin, E Ritter, G Wang
2010 10th IEEE International Conference on Computer and Information …, 2010
882010
Towards the verification of pervasive systems
M Arapinis, M Calder, L Dennis, M Fisher, P Gray, S Konur, A Miller, ...
Electronic Communications of the EASST 22, 2010
202010
An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation
R Yasmin, E Ritter, G Wang
IEICE TRANSACTIONS on Information and Systems 95 (1), 126-133, 2012
182012
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks
R Yasmin, E Ritter, G Wang
International journal of information security 13 (5), 453-465, 2014
112014
A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks
R Yasmin, E Ritter, G Wang
The 5th International Conference on Sensor Technologies and Applications, 21-27, 2011
92011
An efficient authentication framework for wireless sensor networks
R Yasmin
University of Birmingham, 2012
62012
Handbook of Sensor Networks-Algorithms and Architectures Handbook of Sensor Networks-Algorithms and Architectures, 2005
R YASMIN, E RITTER, G WANG
IEICE transactions on information and systems 95 (1), 126-133, 2012
2012
Towards the Verification of Pervasive Systems, Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS2009)
M Arapinis, M Calder, L Denis, M Fisher, P Gray, S Konour, A Miller, ...
2009
Towards the Verification of Pervasive Systems
E Ritter, M Fisher, P Gray, S Konur, A Miller, M Ryan, S Schewe, ...
The system can't perform the operation now. Try again later.
Articles 1–9