4.6 Article

A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

AmirHosein Adavoudi-Jolfaei et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks

Sooyeon Shin et al.

IEEE ACCESS (2018)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Qi Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

Mohammad Wazid et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

Two-factor mutual authentication with key agreement in wireless sensor networks

Binod Vaidya et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

Ashok Kumar Das

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Information Systems

A robust anonymous biometric-based remote user authentication scheme using smart cards

Ashok Kumar Das et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2015)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Information Systems

TinyECCK:: Efficient elliptic curve cryptography implementation over GF(2m) on 8-bit Micaz mote

Seog Chung Seo et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2008)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)