Author:
Singh Anuj Kumar,Nayyar Anand,Garg Ankit
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference81 articles.
1. Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In international workshop on public key cryptography (pp. 65-84). Springer, Berlin, Heidelberg
2. Agilandeeswari L, Paliwal S, Chandrakar A, Prabukumar M (2022) A new lightweight conditional privacy preserving authentication and key–agreement protocol in social internet of things for vehicle to smart grid networks. Multimed Tools Appl 81:1–28
3. Amin R, Islam SH, Biswas GP, Giri D, Khan MK, Kumar N (2016) A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments. Future Gener Comput Syst 78:1005–1019
4. Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019
5. Azrour, M, Mabrouki, J, Chaganti, R (2021) New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT Security and Communication Networks, 2021
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献