LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
Authors
Keywords
-
Journal
WIRELESS NETWORKS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2021-01-03
DOI
10.1007/s11276-020-02523-9
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT
- (2020) Mahdi Fotouhi et al. Computer Networks
- A three-factor anonymous user authentication scheme for Internet of Things environments
- (2020) Hakjun Lee et al. Journal of Information Security and Applications
- Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT
- (2020) R. Vinoth et al. IEEE Internet of Things Journal
- TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
- (2019) Jangirala Srinivas et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
- (2019) Mohammed Alshahrani et al. Journal of Information Security and Applications
- An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
- (2018) Sravani Challa et al. COMPUTERS & ELECTRICAL ENGINEERING
- A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
- (2018) Zhiwei Wang Future Generation Computer Systems-The International Journal of eScience
- A lightweight multi-layer authentication protocol for wireless body area networks
- (2018) Jian Shen et al. Future Generation Computer Systems-The International Journal of eScience
- Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
- (2018) Jangirala Srinivas et al. IEEE Transactions on Dependable and Secure Computing
- Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications
- (2018) Fadi Al-Turjman et al. IEEE Transactions on Industrial Informatics
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
- (2018) Ashok Kumar Das et al. IEEE Internet of Things Journal
- Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
- (2018) Mohammad Wazid et al. IEEE Internet of Things Journal
- Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
- (2017) Mohammad Wazid et al. IEEE Transactions on Dependable and Secure Computing
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- Authentication Protocols for Internet of Things: A Comprehensive Survey
- (2017) Mohamed Amine Ferrag et al. Security and Communication Networks
- A Data-Oriented M2M Messaging Mechanism for Industrial IoT Applications
- (2017) Zhaozong Meng et al. IEEE Internet of Things Journal
- An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
- (2016) Qi Jiang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
- (2015) Vanga Odelu et al. IEEE Transactions on Information Forensics and Security
- A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
- (2015) Debiao He et al. INFORMATION SCIENCES
- Internet of Things in Industries: A Survey
- (2014) Li Da Xu et al. IEEE Transactions on Industrial Informatics
- Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2014) Younsung Choi et al. SENSORS
- A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2013) Wenbo Shi et al. International Journal of Distributed Sensor Networks
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
- (2012) Kaiping Xue et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2011) Hsiu-Lien Yeh et al. SENSORS
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems
- (2010) Xinyi Huang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- (2008) Yevgeniy Dodis et al. SIAM JOURNAL ON COMPUTING
- Assessing readiness of IP networks to support desktop videoconferencing using OPNET
- (2007) K. Salah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreDiscover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversation