4.4 Article

An efficient lightweight authentication scheme for human-centered industrial Internet of Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Review Computer Science, Information Systems

A Review on Human-Centered IoT-Connected Smart Labels for the Industry 4.0

Tiago M. Fernandez-Carames et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

Xiong Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Hardware & Architecture

Lightweight Mutual Authentication for IoT and Its Applications

Nan Li et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring

M. Shamim Hossain et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Information Systems

Secure authentication scheme for IoT and cloud servers

Sheetal Kalra et al.

PERVASIVE AND MOBILE COMPUTING (2015)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Engineering, Electrical & Electronic

Robust smart-card-based remote user password authentication scheme

Bae-Ling Chen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Proceedings Paper Computer Science, Hardware & Architecture

An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update

Arcangelo Castiglione et al.

2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2014)

Article Computer Science, Information Systems

Anonymous authentication for privacy-preserving IoT target-driven applications

Almudena Alcaide et al.

COMPUTERS & SECURITY (2013)

Article Engineering, Electrical & Electronic

A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications

Xuanxia Yao et al.

IEEE SENSORS JOURNAL (2013)

Article Computer Science, Hardware & Architecture

Securing the Internet of Things

Rodrigo Roman et al.

COMPUTER (2011)

Article Computer Science, Theory & Methods

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems

Xinyi Huang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Telecommunications

Internet of Things: Applications and Challenges in Technology and Standardization

Debasis Bandyopadhyay et al.

WIRELESS PERSONAL COMMUNICATIONS (2011)

Article Mathematics, Applied

A new modified remote user authentication scheme using smart cards

Shen Zhong-hua

APPLIED MATHEMATICS-A JOURNAL OF CHINESE UNIVERSITIES SERIES B (2008)

Article Computer Science, Hardware & Architecture

A new method for using hash functions to solve remote user authentication

Tzung-Her Chen et al.

COMPUTERS & ELECTRICAL ENGINEERING (2008)

Article Computer Science, Hardware & Architecture

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)

Article Computer Science, Hardware & Architecture

A password authentication scheme over insecure networks

I-En Liao et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2006)

Article Engineering, Electrical & Electronic

New remote user authentication scheme using smart cards

M Kumar

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)

Article Engineering, Electrical & Electronic

A modified remote user authentication scheme using smart cards

JJ Shen et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2003)

Article Engineering, Electrical & Electronic

Cryptanalysis of a remote user authentication scheme using smart cards

CK Chan et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)

Article Engineering, Electrical & Electronic

A new remote user authentication scheme using smart cards

MS Hwang et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)