相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
Shehzad Ashraf Chaudhry et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
Shehzad Ashraf Chaudhry et al.
IEEE SYSTEMS JOURNAL (2022)
Provable Secure Identity-Based Anonymous and Privacy-Preserving Inter-Vehicular Authentication Protocol for VANETS Using PUF
Muhammad Umar et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)
Comment on Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication
Khalid Mahmood et al.
IEEE SYSTEMS JOURNAL (2021)
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment
Shafiq Ahmed et al.
IEEE TRANSACTIONS ON SMART GRID (2021)
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles
Shehzad Ashraf Chaudhry
SECURITY AND COMMUNICATION NETWORKS (2021)
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
Shehzad Ashraf Chaudhry et al.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)
A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
Muhammad Naeem et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)
An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment
S. Anandhi et al.
WIRELESS PERSONAL COMMUNICATIONS (2020)
An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments
Khalid Mahmood et al.
COMPUTERS & ELECTRICAL ENGINEERING (2020)
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
Srinivas Jangirala et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
A provably secure and anonymous message authentication scheme for smart grids
Xiong Li et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)
A secure user authentication protocol using elliptic curve cryptography
Adesh Kumari et al.
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2019)
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
Xiong Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
Qi Jiang et al.
IEEE NETWORK (2018)
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
Debiao He et al.
IEEE SYSTEMS JOURNAL (2018)
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
SungJin Yu et al.
SENSORS (2018)
A robust ElGamal-based password-authentication protocol using smart card for client-server communication
Tanmoy Maitra et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)
Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm
Yanbing Liu et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2017)
A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks
Xin Liu et al.
PLOS ONE (2017)
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Tian-Fu Lee et al.
PLOS ONE (2017)
A New Efficient Chaotic Maps Based Three Factor User Authentication and Key Agreement Scheme
Lidong Han et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
An improved secure and efficient password and chaos-based two-party key agreement protocol
Yu Liu et al.
NONLINEAR DYNAMICS (2016)
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Qi Jiang et al.
NONLINEAR DYNAMICS (2016)
Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines
Shipra Kumari et al.
COMPUTER NETWORKS (2016)
Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks
Pandi Vijayakumar et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)
2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET
Fei Wang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
A survey on cloud computing security: Issues, threats, and solutions
Saurabh Singh et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
Jia-Lun Tsai et al.
IEEE SYSTEMS JOURNAL (2015)
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System
Chun-Ta Li et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System
Keerti Srivastava et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
Yi-Pin Liao et al.
AD HOC NETWORKS (2014)
A survey on vehicular cloud computing
Md Whaiduzzaman et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
Jue-Sam Chou
JOURNAL OF SUPERCOMPUTING (2014)
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
Mohammad Sabzinejad Farash
JOURNAL OF SUPERCOMPUTING (2014)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Younsung Choi et al.
SENSORS (2014)
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Wenbo Shi et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)
A literature review of RFID-enabled healthcare applications and issues
Samuel Fosso Wamba et al.
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2013)
Vehicular ad hoc networks (VANETS): status, results, and challenges
Sherali Zeadally et al.
TELECOMMUNICATION SYSTEMS (2012)
Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
H. Ning et al.
IET COMMUNICATIONS (2011)
Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization
S. L. Ting et al.
JOURNAL OF MEDICAL SYSTEMS (2011)
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
Jian Wang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
Neyre Tekbiyik et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Security analysis of two recently proposed RFID authentication protocols
Chao Lv et al.
FRONTIERS OF COMPUTER SCIENCE IN CHINA (2011)
Taking VANET to the clouds
Stephan Olariu et al.
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS (2011)
A novel key agreement protocol based on chaotic maps
Di Xiao et al.
INFORMATION SCIENCES (2007)
Security and privacy in RFID and applications in telemedicine
Y Xiao et al.
IEEE COMMUNICATIONS MAGAZINE (2006)
Security problems with a chaos-based deniable authentication scheme
G Alvarez
CHAOS SOLITONS & FRACTALS (2005)