共 50 条
- [3] Cryptanalysis of Remote User Authentication Scheme with key agreement [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
- [4] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
- [5] A user authentication and key agreement scheme for heterogeneous wireless sensor networks [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
- [6] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks [J]. Wireless Personal Communications, 2016, 89 : 447 - 465
- [9] On the design of a secure user authentication and key agreement scheme for wireless sensor networks [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):