Author:
Liu Peng,He Qian,Jiang Bingcheng,Jiang Ming
Publisher
Springer Nature Singapore
Reference19 articles.
1. Wang, C., Wang, D., Tu, Y., Xu, G., Wang, H.: Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans. Dependable Secure Comput. 19(1), 507–523 (2020)
2. Lecture Notes in Computer Science;Q He,2022
3. Ding, W., Feifei, W., et al.: Multi-factor user authentication scheme for multi-gateway wireless sensor networks. Chin. J. Comput. 43(4), 683–700 (2020)
4. Das, A.K., Wazid, M., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment. IEEE Internet Things J. 5(6), 4900–4913 (2018)
5. Wang, D., Li, W., Wang, P.: Crytanalysis of three anonymous authentication schemes for multi-server environment. Ruan Jian Xue Bao. J. Softw. 29(7), 1937–1952 (2018)