An efficient biometric based remote user authentication scheme for secure internet of things environment
暂无分享,去创建一个
Sandip Roy | Santanu Chatterjee | Gautam Mahapatra | Sandip Roy | Gautam Mahapatra | Santanu Chatterjee
[1] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[2] Xin Xu,et al. A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.
[3] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[4] Bruno Blanchet,et al. Models and Proofs of Protocol Security: A Progress Report , 2009, CAV.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Samiran Chattopadhyay,et al. A biometrics-based robust and secure user authentication protocol for e-healthcare service , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[7] Santanu Chatterjee,et al. An efficient dynamic fine grained access control scheme for secure data access in cloud networks , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[8] Ting Wu,et al. Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care , 2014, Journal of Medical Systems.
[9] Santanu Chatterjee,et al. An efficient fine grained access control scheme based on attributes for enterprise class applications , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).
[10] Martín Abadi,et al. Mobile values, new names, and secure communication , 2001, POPL '01.
[11] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[12] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[13] Samiran Chattopadhyay,et al. Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things , 2018, IEEE Internet of Things Journal.
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] Sandip Roy,et al. Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2015, FICTA.
[16] Sandip Roy,et al. An efficient dynamic access control scheme for distributed wireless sensor networks , 2018, Int. J. Ad Hoc Ubiquitous Comput..
[17] Fan Wu,et al. Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.
[18] Cheng-Chi Lee,et al. A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[19] Morteza Nikooghadam,et al. Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[20] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[21] Sandip Roy,et al. Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).