Author:
Chaudhary Ajay,Peddoju Sateesh K,Chouhan Vikas
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference62 articles.
1. Alon, N., Edmonds, J., Luby, M.: Linear time erasure codes with nearly optimal recovery. In: Proceedings of IEEE 36th Annual Foundations of Computer Science, pp. 512–519 (1995)
2. Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks 36, 58–80 (2016)
3. Amin, R., Islam, S.H., et al.: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Compu. Netw. 101, 42–62 (2016). Industrial Technologies and Applications for the Internet of Things
4. Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005–1019 (2018)
5. Amin, R., Kunal, S., Saha, A., Das, D., Alamri, A.: CFSec: Password based secure communication protocol in cloud-fog environment. J. Parallel. Distrib. Comput. 140, 52–62 (2020)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献