Related references
Note: Only part of the references are listed.A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
Dipanwita Sadhukhan et al.
JOURNAL OF SUPERCOMPUTING (2021)
GCACS-IoD: A certificate based generic access control scheme for Internet of drones
Shehzad Ashraf Chaudhry et al.
COMPUTER NETWORKS (2021)
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
Jangirala Srinivas et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
Sravani Challa et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
Mohammad Nikravan et al.
WIRELESS PERSONAL COMMUNICATIONS (2020)
A lightweight authentication and key agreement scheme for Internet of Drones
Yunru Zhang et al.
COMPUTER COMMUNICATIONS (2020)
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
Basudeb Bera et al.
COMPUTER COMMUNICATIONS (2020)
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
Muhammad Tanveer et al.
SENSORS (2020)
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
B. D. Deebak et al.
COMPUTER COMMUNICATIONS (2020)
SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
Tejasvi Alladi et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment
Muhammad Tanveer et al.
IEEE ACCESS (2020)
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network
Mostafa Farhadi Moghadam et al.
IEEE ACCESS (2020)
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
Zeeshan Ali et al.
IEEE ACCESS (2020)
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
Zeeshan Ali et al.
IEEE ACCESS (2020)
Anonymous three-factor authenticated key agreement for wireless sensor networks
Yanrong Lu et al.
WIRELESS NETWORKS (2019)
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
Wei Zhou et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Lightweight IoT-based authentication scheme in cloud computing circumstance
Lu Zhou et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
Sooyeon Shin et al.
SENSORS (2019)
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
UAV Communications for 5G and Beyond: Recent Advances and Future Trends
Bin Li et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
Jangirala Srinivas et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Anonymous authentication scheme for smart home environment with provable security
Mengxia Shuai et al.
COMPUTERS & SECURITY (2019)
A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs
Zheng Yang et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2019)
Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges
Azade Fotouhi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
Xiong Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
Khalid Mahmood et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
Xiong Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Security and Privacy for the Internet of Drones: Challenges and Solutions
Chao Lin et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Yuwen Chen et al.
JOURNAL OF SENSORS (2018)
An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN
Majid Alotaibi
IEEE ACCESS (2018)
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Fan Wu et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2017)
Flying IoT: Toward Low-Power Vision in the Sky
Hasan Genc et al.
IEEE MICRO (2017)
Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks
Jongho Moon et al.
SENSORS (2017)
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Sravani Challa et al.
IEEE ACCESS (2017)
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
Jaewook Jung et al.
SENSORS (2016)
Internet of Drones
Mirmojtaba Gharibi et al.
IEEE ACCESS (2016)
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction
Younsung Choi et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)
General classification of the authenticated encryption schemes for the CAESAR competition
Farzaneh Abed et al.
COMPUTER SCIENCE REVIEW (2016)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi et al.
SENSORS (2014)