RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
暂无分享,去创建一个
Musheer Ahmad | Muhammad Khurram Khan | Saru Kumari | Dheerendra Mishra | Vinod Kumar | M. Khan | S. Kumari | Musheer Ahmad | D. Mishra | M. Ahmad | Vinod Kumar
[1] Elif Uysal-Biyikoglu,et al. Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..
[2] Nursyarizal Mohd Nor,et al. Limitation and Solution for Healthcare Network Using RFID Technology: A Review☆ , 2013 .
[3] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[4] Adesh Kumari,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2017, The Journal of Supercomputing.
[5] Adesh Kumari,et al. A secure user authentication protocol using elliptic curve cryptography , 2019 .
[6] Gongjun Yan,et al. Towards Secure Vehicular Clouds , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.
[7] Rajkumar Buyya,et al. A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..
[8] Jian Shen,et al. A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..
[9] Jianfeng Ma,et al. Security analysis of two recently proposed RFID authentication protocols , 2011, Frontiers of Computer Science in China.
[10] Lemuria Carter,et al. literature review of RFID-enabled healthcare applications and issues amuel , 2013 .
[11] Hamid Barati,et al. An efficient and secure RFID authentication protocol using elliptic curve cryptography , 2019, Wirel. Networks.
[12] Musheer Ahmad,et al. A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.
[13] Vinod Kumar,et al. A Pairing-Free Identity Based Authentication Framework for Cloud Computing , 2013, NSS.
[14] Jue-Sam Chou. An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.
[15] Subhas C. Misra,et al. An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..
[16] Hari Om,et al. Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.
[17] Yanbing Liu,et al. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.
[18] Xin Liu,et al. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks , 2017, PloS one.
[19] Hung-Min Sun,et al. Design and implementation of wearable RFID tag for real-time ubiquitous medical care , 2014, 2014 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems (BioWireleSS).
[20] Jianfeng Ma,et al. Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing , 2018, IEEE Network.
[21] Sherali Zeadally,et al. Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.
[22] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[23] Jia-Lun Tsai,et al. A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.
[24] Xiaojun Zhang,et al. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.
[25] Cheng-Chi Lee,et al. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.
[26] Tatsuo Nakajima,et al. Secure and efficient tag searching in RFID systems using serverless search protocol , 2008 .
[27] R. C. Mittal,et al. A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.
[28] Jian Shen,et al. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.
[29] Ruhul Amin,et al. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity , 2015, Journal of Medical Systems.
[30] Muhammad Khurram Khan,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..
[31] Sheikh Iqbal Ahamed,et al. ERAP: ECC Based RFID Authentication Protocol , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.
[32] Peng Gong,et al. A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.
[33] W. B. Lee,et al. Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.
[34] Roel Peeters,et al. Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol , 2013, IACR Cryptol. ePrint Arch..
[35] Zhian Zhu,et al. An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[36] Arvinder Kaur,et al. Dyanimc key based authentication scheme for Vehicular Cloud Computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[37] Yu-Yi Chen,et al. A Low-cost RFID Authentication Protocol with Location Privacy Protection , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[38] David Pointcheval,et al. Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange , 2008, CANS.
[39] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[40] Y. Zhang,et al. Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..
[41] Musheer Ahmad,et al. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.
[42] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[43] Yalin Chen,et al. ECC-based untraceable authentication for large-scale active-tag RFID systems , 2015, Electron. Commer. Res..
[44] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[45] Donghoon Lee,et al. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.
[46] Vinod Kumar,et al. An Identity-Based Authentication Framework for Big Data Security , 2019 .
[47] Hari Om,et al. A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC , 2017, Comput. Commun..
[48] Xiong Li,et al. A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..
[49] Mohammad Sabzinejad Farash. Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2014, The Journal of Supercomputing.
[50] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[51] Musheer Ahmad,et al. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach , 2019, Journal of King Saud University - Computer and Information Sciences.
[52] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.
[53] Stephan Olariu,et al. Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..
[54] Feng Quan-yuan,et al. A Security RFID Authentication Protocol Based on Hash Function , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[55] YoungHo Park,et al. Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.
[56] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[57] Gaetano Marrocco,et al. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.
[58] Adesh Kumari,et al. SEBAP: A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing , 2019, Int. J. Commun. Syst..