4.6 Article

An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme

Arezou Ostad-Sharif et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

Efficient subtree-based encryption for fuzzy-entity data sharing

Weiran Liu et al.

SOFT COMPUTING (2018)

Article Computer Science, Theory & Methods

Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications

Dariush Abbasinezhad-Mood et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps

Dariush Abbasinezhad-Mood et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller

Dariush Abbasinezhad-Mood et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Computer Science, Information Systems

A lightweight authentication and key agreement protocol preserving user anonymity

Morteza Nikooghadam et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Information Systems

Secure authentication and integrity techniques for randomized secured routing in WSN

U. Senthil Kumaran et al.

WIRELESS NETWORKS (2015)

Article Telecommunications

An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture

Xiong Li et al.

WIRELESS PERSONAL COMMUNICATIONS (2015)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Information Systems

A Secure Authentication and Key Management Scheme for Wireless Sensor Networks

Sarmadullah Khan et al.

SENSOR SYSTEMS AND SOFTWARE (2015)

Article Computer Science, Information Systems

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

Omar Rafik Merad Boudia et al.

AD HOC NETWORKS (2015)

Article Computer Science, Theory & Methods

More efficient key-hash based fingerprint remote authentication scheme using mobile device

Muhammad Khurram Khan et al.

COMPUTING (2014)

Article Computer Science, Information Systems

A Survey of SIP Authentication and Key Agreement Schemes

H. Hakan Kilinc et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

Mobile device integration of a fingerprint biometric remote authentication scheme

Chin-Ling Chen et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Proceedings Paper Computer Science, Information Systems

Robust mobile device integration of a fingerprint biometric remote authentication scheme

Toan-Thinh Truong et al.

2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2012)

Article Computer Science, Information Systems

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)