Related references
Note: Only part of the references are listed.Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Arezou Ostad-Sharif et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Efficient subtree-based encryption for fuzzy-entity data sharing
Weiran Liu et al.
SOFT COMPUTING (2018)
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications
Dariush Abbasinezhad-Mood et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps
Dariush Abbasinezhad-Mood et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Design of an enhanced message authentication scheme for smart grid and its performance analysis on an ARM Cortex-M3 microcontroller
Dariush Abbasinezhad-Mood et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
A lightweight authentication and key agreement protocol preserving user anonymity
Morteza Nikooghadam et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2017)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Ruhul Amin et al.
AD HOC NETWORKS (2016)
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks
Ashok Kumar Das
WIRELESS PERSONAL COMMUNICATIONS (2015)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He et al.
MULTIMEDIA SYSTEMS (2015)
Secure authentication and integrity techniques for randomized secured routing in WSN
U. Senthil Kumaran et al.
WIRELESS NETWORKS (2015)
An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
Xiong Li et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
Qi Jiang et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
Sarmadullah Khan et al.
SENSOR SYSTEMS AND SOFTWARE (2015)
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
Omar Rafik Merad Boudia et al.
AD HOC NETWORKS (2015)
More efficient key-hash based fingerprint remote authentication scheme using mobile device
Muhammad Khurram Khan et al.
COMPUTING (2014)
A Survey of SIP Authentication and Key Agreement Schemes
H. Hakan Kilinc et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Mobile device integration of a fingerprint biometric remote authentication scheme
Chin-Ling Chen et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)
Robust mobile device integration of a fingerprint biometric remote authentication scheme
Toan-Thinh Truong et al.
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2012)
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
Muhammad Khurram Khan et al.
COMPUTER COMMUNICATIONS (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen et al.
ETRI JOURNAL (2010)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)