Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference57 articles.
1. Amin R, Hafizul Islam SK, Biswas GP, Khan MK, Leng L u, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101(jun.4):42–62
2. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Acm Trans Comput Syst 23(5):1–13
3. Chain K, Kuo WC, Chang KH (2015) Enhancement key agreement scheme based on chaotic maps. Int J Comput Appl 37(2):67–72
4. Chang CC, Lin IC (2004) Remarks on fingerprint-based remote user authentication scheme using smart cards. Acm Sigops Operating Systems Review 38 (4):91–96
5. Danny D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献