Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 29, Number 3, June 2024
Page(s) 209 - 218
DOI https://doi.org/10.1051/wujns/2024293209
Published online 03 July 2024
  1. Hamada M, Salem S A, Salem F M. LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments[J]. Ain Shams Engineering Journal, 2022, 13(6): 101752-101766. [CrossRef] [Google Scholar]
  2. Wazid M, Das A K, Kumar N, et al. Design of secure key management and user authentication scheme for fog computing services[J]. Future Generation Computer Systems, 2019, 91(2): 475-492. [CrossRef] [Google Scholar]
  3. Jia X, He D, Kumar N, et al. Authenticated key agreement scheme for fog-driven IoT healthcare system[J]. Wireless Networks, 2019, 25(8): 4737-4750. [CrossRef] [Google Scholar]
  4. Lamport L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772. [CrossRef] [Google Scholar]
  5. Hwang M S, Li L H. A new remote user authentication scheme using smartcards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 28-30. [CrossRef] [Google Scholar]
  6. Juang W S. Efficient multi-server password authenticated key agreement using smart cards[J]. IEEE Transactions on Consumer Electronics, 2004, 50(4): 251-255. [CrossRef] [Google Scholar]
  7. Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3): 1086-1090. [CrossRef] [Google Scholar]
  8. Kang B Y. Cryptanalysis on an E-voting scheme over computer network[J]. 2008 International Conference on Computer Science and Software Engineering, 2008, 3: 826-829. [NASA ADS] [CrossRef] [Google Scholar]
  9. Xue K, Ma C, Hong P, et al. A temporal-credential-based mutual authenticationand key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013, 36(1): 316-323. [CrossRef] [Google Scholar]
  10. Kalra S, Sood S K. Advanced password based authentication scheme for wireless sensor networks[J]. Journal of Information Security and Applications, 2015, 20: 37-46. [CrossRef] [Google Scholar]
  11. Arij B A, Abid M, Meddeb A. A privacy-preserving authentication scheme in an edge-fog environment[J]. ACS International Conference on Computer Systems and Applications, 2018, 2017(10): 1225-1231. [Google Scholar]
  12. Wu T Y, Yang L, Meng Q, et al. Fog-driven secure authentication and key exchange scheme for wearable health monitoring system[J]. Security and Communication Networks, 2021, 2021(4): 1-14. [Google Scholar]
  13. Guo Y M, Zhang Z F, Guo Y J. Fog-centric authenticated key agreement scheme without trusted parties[J]. IEEE Systems Journal, 2021, 15(4): 5057-5066. [NASA ADS] [CrossRef] [Google Scholar]
  14. Ali Z, Chaudhry S A, Mahmood K, et al. A clogging resistant secure authentication scheme for fog computing services[J]. Computer Networks, 2021, 185: 107731. [CrossRef] [Google Scholar]
  15. Weng C Y, Li C T, Chen C L, et al. A lightweight anonymous authentication and secure communication scheme for fog computing services[J]. IEEE Access, 2021, 9(4): 145522-145537. [NASA ADS] [CrossRef] [Google Scholar]
  16. Ma M M, He D B, Wang H Q, et al. An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks[J]. IEEE Internet Things, 2019, 6(5): 8065-8075. [CrossRef] [Google Scholar]
  17. Chen C M, Huang Y, Wang K H, et al. A secure authenticated and key exchange scheme for fog computing[J]. Enterprise Information Systems, 2021, 15(1): 1-16. [NASA ADS] [CrossRef] [Google Scholar]
  18. Rana M, Mahmood K, Saleem MA, et al. Towards a provably secure authentication protocol for fog-driven IoT-based systems[J]. Applied Sciences, 2023, 13(3): 1424-1424. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.