4.7 Article

Three-factor authentication protocol using physical unclonable function for IoV

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

Qi Jiang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Theory & Methods

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

Jie Cui et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database

Urbi Chatterjee et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security

Dooho Choi et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Prosanta Gope et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

Wei Feng et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System

Barnana Baruah et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Hardware & Architecture

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing

Qi Jiang et al.

IEEE NETWORK (2018)

Article Engineering, Electrical & Electronic

Anonymous and Lightweight Authentication for Secure Vehicular Networks

Bidi Ying et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)

Article Computer Science, Information Systems

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Hardware & Architecture

A PUF-Based Secure Communication Protocol for IoT

Urbi Chatterjee et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2017)

Article Engineering, Civil

Routing in Internet of Vehicles: A Review

JiuJun Cheng et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2015)

Article Engineering, Electrical & Electronic

Partner Selection and Incentive Mechanism for Physical Layer Security

Ning Zhang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Theory & Methods

An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation

Jiangshan Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Health Care Sciences & Services

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Review Computer Science, Information Systems

Connected Vehicles: Solutions and Challenges

Ning Lu et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Engineering, Electrical & Electronic

Mobile device integration of a fingerprint biometric remote authentication scheme

Chin-Ling Chen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Computer Science, Theory & Methods

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems

Xinyi Huang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Theory & Methods

A fuzzy vault scheme

A Juels et al.

DESIGNS CODES AND CRYPTOGRAPHY (2006)

Article Multidisciplinary Sciences

Physical one-way functions

R Pappu et al.

SCIENCE (2002)