Related references
Note: Only part of the references are listed.Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
AmirHosein Adavoudi-Jolfaei et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)
Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks
Sooyeon Shin et al.
IEEE ACCESS (2018)
Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
Jaewook Jung et al.
SENSORS (2017)
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Qi Jiang et al.
IEEE ACCESS (2017)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Mohammad Sabzinejad Farash et al.
AD HOC NETWORKS (2016)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin et al.
COMPUTER NETWORKS (2016)
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS
Mohammad Wazid et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
YoHan Park et al.
SENSORS (2016)
Two-factor mutual authentication with key agreement in wireless sensor networks
Binod Vaidya et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
Ashok Kumar Das
PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
I-Pin Chang et al.
SENSORS (2015)
A robust anonymous biometric-based remote user authentication scheme using smart cards
Ashok Kumar Das et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2015)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic et al.
AD HOC NETWORKS (2014)
Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices
Debiao He et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim et al.
SENSORS (2014)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen et al.
ETRI JOURNAL (2010)
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
Muhammad Khurram Khan et al.
SENSORS (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
TinyECCK:: Efficient elliptic curve cryptography implementation over GF(2m) on 8-bit Micaz mote
Seog Chung Seo et al.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2008)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)