相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
Qi Xie et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Insight of the protection for data security under selective opening attacks
Zhengan Huang et al.
INFORMATION SCIENCES (2017)
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments
Ruhul Amin et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment
Alavalapati Goutham Reddy et al.
IEEE ACCESS (2017)
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Qi Jiang et al.
IEEE ACCESS (2017)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
A privacy preserving three-factor authentication protocol for e-Health clouds
Qi Jiang et al.
JOURNAL OF SUPERCOMPUTING (2016)
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design
Tanmoy Maitra et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security
Xiong Li et al.
WIRELESS PERSONAL COMMUNICATIONS (2016)
Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme
Chengqi Wang et al.
PLOS ONE (2016)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Jin Li et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
Vanga Odelu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
A Hybrid Cloud Approach for Secure Authorized Deduplication
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)
An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
Hao Lin et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
Yanrong Lu et al.
PLOS ONE (2015)
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment
Peng Jiang et al.
FRONTIERS OF COMPUTER SCIENCE (2015)
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
Ding Wang et al.
AD HOC NETWORKS (2014)
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
Ming-Chin Chuang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards
Dheerendra Mishra et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
Secure Deduplication with Efficient and Reliable Convergent Key Management
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Security flaws in two improved remote user authentication schemes using smart cards
Chun-Guang Ma et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL Attack
S. K. Hafizul Islam
WIRELESS PERSONAL COMMUNICATIONS (2014)
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Eun-Jun Yoon et al.
JOURNAL OF SUPERCOMPUTING (2013)
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
Muhammad Khurram Khan et al.
COMPUTER COMMUNICATIONS (2011)