Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Abdalla M, Fouque PA, Pointcheval D (2005) “Password-based authenticated key exchange in the three-party setting”, in International Workshop on Public Key Cryptography. Springer, Berlin, pp 65–84
2. Ali HM et al (2022) Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Clust Comput 25:2143–2161
3. Banerjee S, Chunka C, Sen S, Goswami RS (2019) An enhanced and secure biometric based user authentication scheme in wireless sensor networks using smart cards. Wireless Pers Commun 107(1):243–270
4. Chang C, Le H (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wireless Commun 15(1):357–366
5. Chaudhry SA, Irshad A, Yahya K, Kumar N, Alazab M, Zikria YB (2021) Rotating behind privacy: an improved lightweight authentication scheme for cloud-based IoT environment. ACM Trans Internet Technol 21(3):1–19