Author:
Mandali Ramesh,Tirapathi Reddy B.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference25 articles.
1. Borse Y, Siddavatam I. A novel secure remote user authentication protocol using three factors. Int J Comput Appl. 2014;87(17):1–6.
2. Pandya D, Narayan R, Thakkar S, Madhekar T, Thakare B. An overview of various authentication methods and protocols. Int J Comput Appl. 2015;131(9):25–7.
3. Baqer K, Bezuidenhoudt J, Anderson R, Kuhn M. SMAPs: short message authentication protocols. 2017. p. 119–32.
4. Mitchell JC, Roy A, Rowe P, Scedrov A. Analysis of EAP-GPSK authentication protocol. In: International conference on applied cryptography and network security. 2008. p. 309–27.
5. Du LP, Weiguo J, Li Y. Research on micro-certificate based security system for internet of things. Appl Mech Mater. 2013;263:3125–9.