相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things
Muhammad Tanveer et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing
Tsu-Yang Wu et al.
SYMMETRY-BASEL (2022)
CoMSeC plus plus : PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN
Priyanka Mall et al.
COMPUTER NETWORKS (2021)
An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs
Ikram Ali et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)
A secure blockchain-based group key agreement protocol for IoT
Chien-Ming Chen et al.
JOURNAL OF SUPERCOMPUTING (2021)
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
Diksha Rangwani et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key
Anwar Ghani et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)
A robust and anonymous patient monitoring system using wireless medical sensor networks
Ruhul Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Secure multi-factor remote user authentication scheme for Internet of Things environments
Parwinder Kaur Dhillon et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)
A Mutual Authentication Framework for Wireless Medical Sensor Networks
Jangirala Srinivas et al.
JOURNAL OF MEDICAL SYSTEMS (2017)
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Fan Wu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Mohammad Sabzinejad Farash et al.
AD HOC NETWORKS (2016)
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Ruhul Amin et al.
AD HOC NETWORKS (2016)
Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
Ruhul Amin et al.
COMPUTER NETWORKS (2016)
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
Saru Kumari et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Qi Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
Chin-Chen Chang et al.
WIRELESS PERSONAL COMMUNICATIONS (2016)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
Debiao He et al.
INFORMATION SCIENCES (2015)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic et al.
AD HOC NETWORKS (2014)
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
Kaiping Xue et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Hsiu-Lien Yeh et al.
SENSORS (2011)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)