相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An improved and provably secure three-factor user authentication scheme for wireless sensor networks
Fan Wu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
Debiao He et al.
IEEE SYSTEMS JOURNAL (2018)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He et al.
IEEE SYSTEMS JOURNAL (2017)
Security analysis and design of an efficient ECC-based two-factor password authentication scheme
Tanmoy Maitra et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault
Lu Leng et al.
PATTERN RECOGNITION (2015)
Cryptanalysis and Improvement of A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
Mojtaba Alizadeh et al.
PLOS ONE (2015)
An enhanced privacy preserving remote user authentication scheme with provable security
Shehzad Ashraf Chaudhry et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He et al.
MULTIMEDIA SYSTEMS (2015)
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Ding Wang et al.
COMPUTER NETWORKS (2014)
A Survey of SIP Authentication and Key Agreement Schemes
H. Hakan Kilinc et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems
Qi Xie et al.
PLOS ONE (2014)
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion
Lu Leng et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
Mohammad Sabzinejad Farash et al.
COMPUTERS & ELECTRICAL ENGINEERING (2013)
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Eun-Jun Yoon et al.
JOURNAL OF SUPERCOMPUTING (2013)
A new authenticated key agreement for session initiation protocol
Qi Xie
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)
An improved BioHashing for human authentication
Alessandra Lumini et al.
PATTERN RECOGNITION (2007)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
ATB Jin et al.
PATTERN RECOGNITION (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)