A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion
暂无分享,去创建一个
Neeraj Kumar | Fan Wu | Pandi Vijayakumar | Lili Xu | Xiong Li | Neeraj Kumar | Xiong Li | Fan Wu | P. Vijayakumar | Lili Xu
[1] Shehzad Ashraf Chaudhry,et al. Comments on “Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment” , 2019, IEEE Internet of Things Journal.
[2] Jeroen Famaey,et al. Implementation and Validation of an IEEE 802.11ah Module for ns-3 , 2016, WNS3.
[3] Changjun Jiang,et al. A biometric-based user authentication for wireless sensor networks , 2010, Wuhan University Journal of Natural Sciences.
[4] Jian Ma,et al. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments , 2013, Math. Comput. Model..
[5] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[6] Ying Chen,et al. An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks , 2019, IEEE Access.
[7] Mznah Al-Rodhaan,et al. An Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[8] Hye-Jin Kim,et al. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..
[9] Xiong Li,et al. An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[10] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[11] Jin Wang,et al. Lightweight deep network for traffic sign classification , 2019, Annals of Telecommunications.
[12] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[13] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[14] Eun-Jun Yoon,et al. A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[15] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[16] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[17] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[18] Chun Chen,et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[19] Shiming He,et al. PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid , 2017, KSII Trans. Internet Inf. Syst..
[20] Kim-Kwang Raymond Choo,et al. White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography , 2020, IACR Cryptol. ePrint Arch..
[21] Xiong Li,et al. A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..
[22] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[23] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[24] Carmen Sánchez Ávila,et al. Biometric Fuzzy Extractor Scheme for Iris Templates , 2009, Security and Management.
[25] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[26] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[27] Athanasios V. Vasilakos,et al. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.
[28] Dariush Abbasinezhad-Mood,et al. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..
[29] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[30] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[31] Xiong Li,et al. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.
[32] Hoon-Jae Lee,et al. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks , 2011, 2011 Wireless Advanced.
[33] Arun Kumar Sangaiah,et al. An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.
[34] Xiong Li,et al. A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography , 2019, IEEE Systems Journal.
[35] Kenichi Mori,et al. IEEE 802.11ah , 2016 .
[36] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[37] Ashok Kumar Das. Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Networks , 2014, SSCC.
[38] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[39] Feng Li,et al. Parameters Compressing in Deep Learning , 2020 .
[40] Sungyoung Lee,et al. A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs , 2017, Cluster Computing.
[41] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.