4.6 Article

A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion

Related references

Note: Only part of the references are listed.
Article Telecommunications

Lightweight deep network for traffic sign classification

Jianming Zhang et al.

ANNALS OF TELECOMMUNICATIONS (2020)

Article Computer Science, Information Systems

Parameters Compressing in Deep Learning

Shiming He et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2020)

Article Computer Science, Theory & Methods

Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme

Arezou Ostad-Sharif et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

An empower hamilton loop based data collection algorithm with mobile agent for WSNs

Jin Wang et al.

HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography

Fan Wu et al.

IEEE SYSTEMS JOURNAL (2019)

Editorial Material Computer Science, Information Systems

Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Sajid Hussain et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs

Jin Wang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things

Xiong Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks

Jin Wang et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Information Systems

An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

Ashok Kumar Das et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Hardware & Architecture

An enhanced smart card based remote user password authentication scheme

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Interdisciplinary Applications

A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments

Xiong Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2013)

Article Computer Science, Information Systems

An Efficient Biometric Authentication Protocol for Wireless Sensor Networks

Ohood Althobaiti et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)