Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
出版年份 2021 全文链接
标题
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment
作者
关键词
-
出版物
ACM Transactions on Internet Technology
Volume 21, Issue 3, Pages 1-19
出版商
Association for Computing Machinery (ACM)
发表日期
2021-06-09
DOI
10.1145/3425707
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems
- (2020) Shehzad Ashraf Chaudhry et al. COMPUTER COMMUNICATIONS
- Machine Learning Models for Secure Data Analytics: A taxonomy and threat model
- (2020) Rajesh Gupta et al. COMPUTER COMMUNICATIONS
- Convolutional neural networks for 5G-enabled Intelligent Transportation System : A systematic review
- (2020) Deepika Sirohi et al. COMPUTER COMMUNICATIONS
- Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges
- (2020) Divya Prerna et al. COMPUTER COMMUNICATIONS
- Software defined solutions for sensors in 6G/IoE
- (2020) Zhihan Lv et al. COMPUTER COMMUNICATIONS
- An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
- (2020) Mahmood Ul Hassan et al. WIRELESS PERSONAL COMMUNICATIONS
- A Privacy Preserving Authentication Scheme for Roaming in IoT-Based Wireless Mobile Networks
- (2020) Bander A. Alzahrani et al. Symmetry-Basel
- A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
- (2020) Azeem Irshad et al. IEEE Systems Journal
- TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
- (2019) Jangirala Srinivas et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review
- (2019) Sandeep Saharan et al. COMPUTER COMMUNICATIONS
- Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges
- (2019) Shubhani Aggarwal et al. COMPUTER COMMUNICATIONS
- Trust management in social Internet of Things: A taxonomy, open issues, and challenges
- (2019) Rajanpreet Kaur Chahal et al. COMPUTER COMMUNICATIONS
- LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
- (2019) Mohammad Wazid et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure
- (2018) Khalid Mahmood et al. Future Generation Computer Systems-The International Journal of eScience
- Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems
- (2018) Sravani Challa et al. Future Generation Computer Systems-The International Journal of eScience
- A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
- (2018) Ruhul Amin et al. Future Generation Computer Systems-The International Journal of eScience
- Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
- (2018) Jianbing Ni et al. IEEE Communications Surveys and Tutorials
- Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
- (2017) Sravani Challa et al. IEEE Access
- Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
- (2017) Qi Jiang et al. IEEE Access
- An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
- (2016) Mohammad Sabzinejad Farash et al. Ad Hoc Networks
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
- (2016) Chin-Chen Chang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
- (2016) Fan Wu et al. Journal of Ambient Intelligence and Humanized Computing
- A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
- (2014) Muhamed Turkanović et al. Ad Hoc Networks
- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks
- (2013) Wen-Bin Hsieh et al. WIRELESS PERSONAL COMMUNICATIONS
- A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2013) Wenbo Shi et al. International Journal of Distributed Sensor Networks
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2011) Hsiu-Lien Yeh et al. SENSORS
- Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’
- (2010) Muhammad Khurram Khan et al. SENSORS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started