Author:
Li Zhen,Yang Lei,Wu Tsu-Yang,Chen Chien-Ming
Publisher
Springer Nature Singapore
Reference21 articles.
1. Akram, M.A., Ghaffar, Z., Mahmood, K., Kumari, S., Agarwal, K., Chen, C.M.: An anonymous authenticated key-agreement scheme for multi-server infrastructure. HCIS 10, 1–18 (2020)
2. Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Futur. Gener. Comput. Syst. 78, 1005–1019 (2018)
3. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
4. Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on “an improved secure and efficient password and chaos-based two-party key agreement protocol”. Nonlinear Dyn. 87(3), 2073–2075 (2017)
5. Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. Ieee Access 5, 3410–3422 (2017)