An efficient biometric based remote user authentication scheme for secure internet of things environment

[1]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[2]  Xin Xu,et al.  A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.

[3]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[4]  Bruno Blanchet,et al.  Models and Proofs of Protocol Security: A Progress Report , 2009, CAV.

[5]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[6]  Samiran Chattopadhyay,et al.  A biometrics-based robust and secure user authentication protocol for e-healthcare service , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[7]  Santanu Chatterjee,et al.  An efficient dynamic fine grained access control scheme for secure data access in cloud networks , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[8]  Ting Wu,et al.  Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care , 2014, Journal of Medical Systems.

[9]  Santanu Chatterjee,et al.  An efficient fine grained access control scheme based on attributes for enterprise class applications , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).

[10]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[11]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[12]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[13]  Samiran Chattopadhyay,et al.  Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things , 2018, IEEE Internet of Things Journal.

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  Sandip Roy,et al.  Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2015, FICTA.

[16]  Sandip Roy,et al.  An efficient dynamic access control scheme for distributed wireless sensor networks , 2018, Int. J. Ad Hoc Ubiquitous Comput..

[17]  Fan Wu,et al.  Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.

[18]  Cheng-Chi Lee,et al.  A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.

[19]  Morteza Nikooghadam,et al.  Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.

[20]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[21]  Sandip Roy,et al.  Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).