A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city
暂无分享,去创建一个
Xiong Li | Kim-Kwang Raymond Choo | Saru Kumari | Jianwei Niu | Fan Wu | Xiong Li | J. Niu | S. Kumari | Fan Wu
[1] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[2] Arun Kumar Sangaiah,et al. MIFIM - Middleware solution for service centric anomaly in future internet models , 2017, Future Gener. Comput. Syst..
[3] Minjie Zhang,et al. A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..
[4] Arun Kumar Sangaiah,et al. Integrated QoUE and QoS approach for optimal service composition selection in internet of services (IoS) , 2016, Multimedia Tools and Applications.
[5] Jianfeng Ma,et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .
[6] Lili Xu,et al. A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks , 2016, Secur. Commun. Networks.
[7] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[8] Prosanta Gope,et al. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks , 2016, J. Netw. Comput. Appl..
[9] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[10] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[11] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[12] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[13] Xiong Li,et al. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks , 2015, Comput. Electr. Eng..
[14] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[15] Prosanta Gope,et al. Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks , 2015, Wirel. Pers. Commun..
[16] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[17] Fan Wu,et al. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity , 2015, Secur. Commun. Networks.
[18] Wei Liang,et al. Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update , 2015, Int. J. Commun. Syst..
[19] Xingming Sun,et al. Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..
[20] Xiong Li,et al. A novel user authentication scheme with anonymity for wireless communications , 2014, Secur. Commun. Networks.
[21] Guomin Yang,et al. A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks , 2013, Wireless Personal Communications.
[22] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[23] Jianfeng Ma,et al. An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks , 2012, Wireless Personal Communications.
[24] Cheng-Chi Lee,et al. A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..
[25] Eun-Jun Yoon,et al. A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..
[26] Chun Chen,et al. A strong user authentication scheme with smart cards for wireless communications , 2011, Comput. Commun..
[27] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[28] Chun-I Fan,et al. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.
[29] Jongin Lim,et al. Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks , 2009, IEEE Communications Letters.
[30] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[31] Chin-Chen Chang,et al. Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..
[32] R. Hollands. Will the real smart city please stand up? , 2008, The Routledge Companion to Smart Cities.
[33] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[34] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[35] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[36] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[37] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[38] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[39] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[40] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[41] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.