Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference45 articles.
1. Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps;Abbasinezhad-Mood;IEEE Trans. Ind. Inform.,2018
2. Efficient provably-secure privacy-preserving signature-based key establishment protocol;Abbasinezhad-Mood;Ad Hoc Netw.,2020
3. A new lattice-based authentication scheme for IoT;Akleylek;J. Inf. Secur. Appl.,2022
4. Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems;Amin;J. Med. Syst.,2015
5. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks;Amin;Comput. Netw.,2016
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献