4.6 Article Proceedings Paper

Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Anonymous three-factor authenticated key agreement for wireless sensor networks

Yanrong Lu et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Information Systems

A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks

Hua Guo et al.

AD HOC NETWORKS (2019)

Article Computer Science, Information Systems

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks

Jiaqing Mo et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Theory & Methods

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

Fan Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

Rifaqat Ali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Smart Choice for the Smart Grid: Narrowband Internet of Things (NB-IoT)

Yuke Li et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

Ashok Kumar Das

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Automation & Control Systems

Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System

Haiping Huang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Proceedings Paper Computer Science, Theory & Methods

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks

Xiong Li et al.

RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY (2017)

Article Computer Science, Information Systems

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

Jangirala Srinivas et al.

AD HOC NETWORKS (2017)

Article Computer Science, Information Systems

Unsupervised Residential Power Usage Monitoring Using a Wireless Sensor Network

Rui Tan et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2017)

Article Automation & Control Systems

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Computer Science, Information Systems

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks

Qi Jiang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Computer Science, Hardware & Architecture

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

Future Internet of Things: open issues and challenges

Chun-Wei Tsai et al.

WIRELESS NETWORKS (2014)

Article Computer Science, Hardware & Architecture

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Kaiping Xue et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Information Systems

An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks

Rong Fan et al.

JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS (2011)

Article Engineering, Electrical & Electronic

A Robust Mutual Authentication Protocol for Wireless Sensor Networks

Tien-Ho Chen et al.

ETRI JOURNAL (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)