Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Formal security analysis and verification of a password-based user authentication scheme for hierarchical wireless sensor networks
Ashok Kumar Das; Santanu Chatterjee; Jamuna Kanta Sing
International Journal of Trust Management in Computing and Communications (IJTMCC), 2014 Vol.2 No.1, pp.78 - 102
6 - 14 =

Thank you for your feedback.