Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
暂无分享,去创建一个
Sherali Zeadally | Jianfeng Ma | Debiao He | Qi Jiang | D. He | S. Zeadally | Jianfeng Ma | Qi Jiang | De-biao He
[1] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[2] G. P. Biswas,et al. Establishment of ECC-based Initial Secrecy Usable for IKE Implementation , .
[3] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[4] Utz Roedig,et al. Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[5] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[6] Jorge Sá Silva,et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.
[7] Eun-Jun Yoon,et al. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography , 2016, IEEE Access.
[8] Sherali Zeadally,et al. Authentication protocol for an ambient assisted living system , 2015, IEEE Communications Magazine.
[9] Sai Ji,et al. Towards efficient content-aware search over encrypted outsourced data in cloud , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[10] Fabrice Benhamouda,et al. Security of the J-PAKE Password-Authenticated Key Exchange Protocol , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[12] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[13] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[14] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[15] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[16] Jianfeng Ma,et al. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2018, IEEE Systems Journal.
[17] Xiong Li,et al. Applying biometrics to design three-factor remote user authentication scheme with key agreement , 2014, Secur. Commun. Networks.
[18] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[19] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[20] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.
[21] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[22] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[23] Sherali Zeadally,et al. Privacy in a Digital, Networked World: Technologies, Implications and Solutions , 2015 .
[24] Xiong Li,et al. Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.
[25] Jianfeng Ma,et al. Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..
[26] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[27] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[28] Rodrigo Roman,et al. Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..
[29] Hongwei Li,et al. Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.
[30] Jian Shen,et al. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..
[31] Xiong Li,et al. An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[32] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[33] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.
[34] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[35] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[36] Daeyoung Kim,et al. SNAIL: an IP-based wireless sensor network approach to the internet of things , 2010, IEEE Wireless Communications.
[37] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[38] Muhammad Khurram Khan,et al. User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.
[39] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[40] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[41] LaurentMaryline,et al. Survey on secure communication protocols for the Internet of Things , 2015, AdHocNets 2015.
[42] Xiong Li,et al. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..
[43] Yong Xiang,et al. Protection of Privacy in Biometric Data , 2016, IEEE Access.
[44] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[45] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[46] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[47] Jian Shen,et al. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[48] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[49] Yanfei Sun,et al. A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.
[50] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[51] Hung-Yu Chien. Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices , 2013, Comput. Networks.
[52] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[53] Jian Shen,et al. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks , 2016, Inf. Technol. Control..
[54] Lixiang Li,et al. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks , 2016, Sensors.
[55] Jianfeng Ma,et al. A privacy‐aware two‐factor authentication protocol based on elliptic curve cryptography for wireless sensor networks , 2017, Int. J. Netw. Manag..
[56] Ping Wang,et al. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound , 2018, IEEE Transactions on Dependable and Secure Computing.
[57] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[58] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[59] Zhe Liu,et al. Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes , 2016, IEEE Transactions on Information Forensics and Security.
[60] Vanga Odelu,et al. A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks , 2017, Wirel. Pers. Commun..
[61] Jianfeng Ma,et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .
[62] Hu Xiong,et al. Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol , 2014, IEEE Transactions on Information Forensics and Security.
[63] Marivi Higuero,et al. Ladon1: end-to-end authorisation support for resource-deprived environments , 2012, IET Inf. Secur..
[64] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[65] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[66] Naveen K. Chilamkurti,et al. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..
[67] Ping Wang,et al. The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes , 2016, AsiaCCS.
[68] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[69] Nerea Toledo,et al. Enhancing secure access to sensor data with user privacy support , 2014, Comput. Networks.
[70] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.