An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
Published 2023 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
Authors
Keywords
-
Journal
International Journal of Information Security
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2023-11-02
DOI
10.1007/s10207-023-00770-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
- (2021) Yulei Chen et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Secure authenticated key exchange for WSNs in IoT applications
- (2021) Mingping Qi et al. JOURNAL OF SUPERCOMPUTING
- An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
- (2021) Yulei Chen et al. JOURNAL OF SUPERCOMPUTING
- A secure and efficient user authentication protocol for wireless sensor network
- (2021) Devender Kumar MULTIMEDIA TOOLS AND APPLICATIONS
- A biometrics‐based anonymous authentication and key agreement scheme for wireless sensor networks
- (2021) Qing Fan et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- Efficient provably-secure privacy-preserving signature-based key establishment protocol
- (2020) Dariush Abbasinezhad-Mood et al. Ad Hoc Networks
- Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks
- (2020) Chenyu Wang et al. IEEE Transactions on Dependable and Secure Computing
- Anonymous authentication scheme for smart home environment with provable security
- (2019) Mengxia Shuai et al. COMPUTERS & SECURITY
- An improved user authentication protocol for wireless sensor networks
- (2019) Damandeep Kaur et al. Transactions on Emerging Telecommunications Technologies
- A provably secure biometrics and ECC-based authentication and key agreement scheme for WSNs
- (2019) Saru Kumari et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Understanding security failures of multi-factor authentication schemes for multi-server environments
- (2019) Ding Wang et al. COMPUTERS & SECURITY
- Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
- (2018) Jangirala Srinivas et al. IEEE Transactions on Dependable and Secure Computing
- Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
- (2018) Ding Wang et al. IEEE Transactions on Industrial Informatics
- Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
- (2018) Prosanta Gope et al. IEEE Transactions on Information Forensics and Security
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks
- (2018) Wenting Li et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
- (2018) JiLiang Li et al. Transactions on Emerging Telecommunications Technologies
- On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
- (2018) Jun He et al. International Journal of Distributed Sensor Networks
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
- (2016) Mohammad Sabzinejad Farash et al. Ad Hoc Networks
- A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
- (2016) Saru Kumari et al. Future Generation Computer Systems-The International Journal of eScience
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
- (2016) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- A new and secure authentication scheme for wireless sensor networks with formal proof
- (2015) Fan Wu et al. Peer-to-Peer Networking and Applications
- Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
- (2014) Ding Wang et al. Ad Hoc Networks
- A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
- (2014) Muhamed Turkanović et al. Ad Hoc Networks
- On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
- (2014) Ding Wang et al. Computer Networks
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
- (2014) Ashok Kumar Das Peer-to-Peer Networking and Applications
- An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
- (2013) Chun-Ta Li et al. SENSORS
- An enhanced two-factor user authentication in wireless sensor networks
- (2013) Jian-Jun Yuan TELECOMMUNICATION SYSTEMS
- Security flaws in two improved remote user authentication schemes using smart cards
- (2012) Chun-Guang Ma et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
- (2012) Ashok Kumar Das et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
- (2012) Kaiping Xue et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks
- (2012) Sang Guun Yoo et al. International Journal of Distributed Sensor Networks
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- (2008) Yevgeniy Dodis et al. SIAM JOURNAL ON COMPUTING
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started