References
- Saurabh Jain, C. Nandhini, Rajesh Doriya, ECC Based Authentication Scheme for Cloud Based Robots, Wireless Personal Communications, (2020).
- Suman Majumder, sangram Ray, Dipanwita Sadhukhan, Mohammad Kurram Khan, Mou Dasgupta, ECC CoAP: Elliptic Curve Cryptography Based Constraint Protocol for Internet of Things, Wireless Personal Communications, (2020).
- Xuanmei Qin, Yongfeng Huang, Xing Li, An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks, Soft Computing, 24:18881– 18891, (2020). doi: https://doi.org/10.1007/s00500-020-05117-x
- Samad Rostampour, Masoumeh Safkhani, Ygal Bendavid, Nasour Bagheri, ECCbAP: A secure ECC-based authentication protocol for IoT edge devices, Pervasive and Mobile Computing, 67, 101194. (2020).
- W Nissa Mehibel & M’hamed Hamadouche, A new enhancement of elliptic curve digital signature algorithm, Journal of Discrete Mathematical Sciences and Cryptography, Volume 23, 2020 - Issue 3, Pages: 743–757. (2020). doi: https://doi.org/10.1080/09720529.2019.1615673
- Devender Kumar, Harsh Kumar Singh & Chhahat Ahlawat, A secure three-factor authentication scheme for wireless sensor networks using ECC, Journal of Discrete Mathematical Sciences and Cryptography, Volume 23, Pages: 879–900. (2020). doi: https://doi.org/10.1080/09720529.2019.1627072
- Santoshi Pote, Virendra Sule, B. K. Lande, Elliptic curve cryptography arithmetic in terms of one variable polynomial division, Journal of Discrete Mathematical Sciences and Cryptography, Volume 23, Issue 8, Pages: 1545.(2020). doi: https://doi.org/10.1080/09720529.2019.1702754
- Kumari Saru, Karuppiah, Marimuthu Das, A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers, Journal of Supercomputing, Volume 74, Issue 12. (2018).
- J. Sunil kumar, Karan Singh, A keyless secure data aggregation mechanism, Journal of Discrete Mathematical Sciences and Cryptography Volume 22, 2019 - Issue 8 Pages 1533–1548. (2019). doi: https://doi.org/10.1080/09720529.2019.1695902
- M. Wazid, A.K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo, Design of secure user authenticated key management protocol for generic IoT networks, IEEE Internet of Things Journal, 5 (1), pp. 269–282, (2018). doi: https://doi.org/10.1109/JIOT.2017.2780232
- Reem Melki, Hassan N, Noura, Ali Chehab, Light-weight multi-factor mutual authentication protocol for IoT devices, International Journal of Information Security, (2019).
- Das, A., et al.: Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Netw. 9(16), pp. 3670–3687 (2016)
- Chang, C., Le, H., A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wirel. Commun. 15(1), pp. 357–366, (2016). doi: https://doi.org/10.1109/TWC.2015.2473165