Related references
Note: Only part of the references are listed.A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
Kim-Kwang Raymond Choo et al.
INFORMATION SCIENCES (2014)
Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
Jiye Kim et al.
SENSORS (2014)
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Junghyun Nam et al.
SENSORS (2014)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi et al.
SENSORS (2014)
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Junghyun Nam et al.
SCIENTIFIC WORLD JOURNAL (2014)
Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
Younsung Choi et al.
SCIENTIFIC WORLD JOURNAL (2014)
Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks
Eun-Jun Yoon et al.
SENSOR LETTERS (2013)
An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
Woongryul Jeon et al.
IEICE TRANSACTIONS ON COMMUNICATIONS (2012)
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
Tien-Ho Chen et al.
ETRI JOURNAL (2010)
Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
Muhammad Khurram Khan et al.
SENSORS (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Venkata C. Giruka et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2006)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)