相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
Rifaqat Ali et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A robust and anonymous patient monitoring system using wireless medical sensor networks
Ruhul Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS
Preeti Chandrakar et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System
Rifaqat Ali et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)
An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
Preeti Chandrakar et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
Fan Wu et al.
MULTIMEDIA SYSTEMS (2017)
AnonPri: A secure anonymous private authentication protocol for RFID systems
Farzana Rahman et al.
INFORMATION SCIENCES (2017)
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Fan Wu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
Fan Wu et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
Preeti Chandrakar et al.
COMPUTER COMMUNICATIONS (2017)
Secure user authentication scheme for wireless healthcare sensor networks
Chia-Hui Liu et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem
Rifaqat Ali et al.
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2017)
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment
Preeti Chandrakar et al.
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2017)
Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
Preeti Chandrakar et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
Xiong Li et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
Anil Kumar Sutrala et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin et al.
COMPUTER NETWORKS (2016)
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
Liang Ni et al.
INFORMATION SCIENCES (2016)
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
Preeti Chandrakar et al.
INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2016)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
A novel authenticated encryption scheme and its extension
Jianhong Zhang et al.
INFORMATION SCIENCES (2015)
Certificate less one-pass and two-party authenticated key agreement protocol and its extensions
Lei Zhang
INFORMATION SCIENCES (2015)
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Ding Wang et al.
INFORMATION SCIENCES (2015)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
Debiao He et al.
INFORMATION SCIENCES (2015)
Enhancing the security of password authenticated key agreement protocols based on chaotic maps
Tian-Fu Lee
INFORMATION SCIENCES (2015)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He et al.
MULTIMEDIA SYSTEMS (2015)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic et al.
AD HOC NETWORKS (2014)
Provably secure proxy convertible authenticated encryption scheme based on RSA
Tzong-Sun Wu et al.
INFORMATION SCIENCES (2014)
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
Jianghong Wei et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks
Qi Jiang et al.
WIRELESS PERSONAL COMMUNICATIONS (2014)
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks
Muhammad Khurram Khan et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
Pardeep Kumar et al.
SENSORS (2012)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das
IET INFORMATION SECURITY (2011)
An efficient anonymous authentication protocol for mobile pay-TV
Tien-Ho Chen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)