Author:
Li Xiong,Niu Jianwei,Kumari Saru,Islam SK Hafizul,Wu Fan,Khan Muhammad Khurram,Das Ashok Kumar
Funder
National Natural Science Foundation of China
China Postdoctoral Science Foundation Funded Project
The Outstanding Potential for Excellence in Research and Academics (OPERA) award, BITS Pilani, India
The Deanship of Scientific Research at King Saud University for its funding this Prolific Research Group
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference52 articles.
1. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.
2. Horng, G. (1995). Password authentication without using a password table. Information Processing Letters, 550(5), 247–250.
3. Jan, J. K., & Chen, Y. Y. (1998). Paramita wisdom password authentication scheme without verification tables. Journal of Systems and Software, 42(1), 45–57.
4. He, D. B., Kumar, N., & Naveen, C. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 321, 263–277.
5. He, D. B., & Wang, D. (2015). Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal, 9(3), 816–823.
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献