|
[1]
|
Chen, J., Zhang, Y. and Su, W. (2015) An Anonymous Authentication Scheme for Plug-In Electric Vehicles Joining to Charging/discharging Station in Vehicle-to-Grid (V2G) Networks. China Communications, 12, 9-19. [Google Scholar] [CrossRef]
|
|
[2]
|
Abbasinezhad-Mood, D., Ostad-Sharif, A., Mazinani, S.M. and Nikooghadam, M. (2020) Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections with Privacy Protection. IEEE Transactions on Industrial Informatics, 16, 7287-7294. [Google Scholar] [CrossRef]
|
|
[3]
|
Zhang, Y., Zou, J. and Guo, R. (2020) Efficient Privacy-Preserving Authentication for V2G Networks. Peer-to-Peer Networking and Applications, 14, 1366-1378. [Google Scholar] [CrossRef]
|
|
[4]
|
Wu, F., Xu, L., Kumari, S. and Li, X. (2015) An Improved and Anonymous Two-Factor Authentication Protocol for Health-Care Applications with Wireless Medical Sensor Networks. Multimedia Systems, 23, 195-205. [Google Scholar] [CrossRef]
|
|
[5]
|
Das, A.K., Sutrala, A.K., Odelu, V. and Goswami, A. (2016) A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wireless Personal Communications, 94, 1899-1933. [Google Scholar] [CrossRef]
|
|
[6]
|
Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K. and Kumar, N. (2018) A Robust and Anonymous Patient Monitoring System Using Wireless Medical Sensor Networks. Future Generation Computer Systems, 80, 483-495. [Google Scholar] [CrossRef]
|
|
[7]
|
Ali, R., Pal, A.K., Kumari, S., Sangaiah, A.K., Li, X. and Wu, F. (2018) An Enhanced Three Factor Based Authentication Protocol Using Wireless Medical Sensor Networks for Healthcare Monitoring. Journal of Ambient Intelligence and Humanized Computing, 15, 1165-1186. [Google Scholar] [CrossRef]
|
|
[8]
|
Cui, J., Zhu, Y., Zhong, H., Zhang, Q., Gu, C. and He, D. (2024) Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT. IEEE Internet of Things Journal, 11, 16325-16338. [Google Scholar] [CrossRef]
|
|
[9]
|
Das, M.L., Saxena, A. and Gulati, V.P. (2004) A Dynamic Id-Based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, 50, 629-631. [Google Scholar] [CrossRef]
|
|
[10]
|
Wang, Y., Liu, J., Xiao, F. and Dan, J. (2009) A More Efficient and Secure Dynamic Id-Based Remote User Authentication Scheme. Computer Communications, 32, 583-585. [Google Scholar] [CrossRef]
|
|
[11]
|
Chen, H., Lo, J. and Yeh, C. (2012) An Efficient and Secure Dynamic Id-Based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems, 36, 3907-3915. [Google Scholar] [CrossRef] [PubMed]
|
|
[12]
|
Wen, F. and Li, X. (2012) An Improved Dynamic Id-Based Remote User Authentication with Key Agreement Scheme. Computers & Electrical Engineering, 38, 381-387. [Google Scholar] [CrossRef]
|
|
[13]
|
Xie, Q., Wong, D.S., Wang, G., Tan, X., Chen, K. and Fang, L. (2017) Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics and Security, 12, 1382-1392. [Google Scholar] [CrossRef]
|
|
[14]
|
Kumari, S. and Renuka, K. (2019) Design of a Password Authentication and Key Agreement Scheme to Access E-Healthcare Services. Wireless Personal Communications, 117, 27-45. [Google Scholar] [CrossRef]
|
|
[15]
|
Gope, P. and Sikdar, B. (2019) An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication. IEEE Transactions on Smart Grid, 10, 6607-6618. [Google Scholar] [CrossRef]
|
|
[16]
|
Irshad, A., Usman, M., Ashraf Chaudhry, S., Naqvi, H. and Shafiq, M. (2020) A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet Based Vehicle-to-Grid Technology Framework. IEEE Transactions on Industry Applications, 56, 4425-4435. [Google Scholar] [CrossRef]
|
|
[17]
|
Yu, S. and Park, K. (2024) PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks. IEEE Internet of Things Journal, 11, 15450-15464. [Google Scholar] [CrossRef]
|
|
[18]
|
Turkanović, M., Brumen, B. and Hölbl, M. (2014) A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, Based on the Internet of Things Notion. Ad Hoc Networks, 20, 96-112. [Google Scholar] [CrossRef]
|
|
[19]
|
Farash, M.S., Turkanović, M., Kumari, S. and Hölbl, M. (2016) An Efficient User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Network Tailored for the Internet of Things Environment. Ad Hoc Networks, 36, 152-176. [Google Scholar] [CrossRef]
|
|
[20]
|
Yuanbing, W., Wanrong, L. and Bin, L. (2021) An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access, 9, 105101-105117. [Google Scholar] [CrossRef]
|
|
[21]
|
Lian, H., Pan, T., Wang, H. and Zhao, Y. (2021) Identity-Based Identity-Concealed Authenticated Key Exchange. In: Lecture Notes in Computer Science, Springer, 651-675. [Google Scholar] [CrossRef]
|
|
[22]
|
Libert, B., Paterson, K.G. and Quaglia, E.A. (2012) Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. In: Lecture Notes in Computer Science, Springer, 206-224. [Google Scholar] [CrossRef]
|
|
[23]
|
Lin, H. (2017) Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs. In: Lecture Notes in Computer Science, Springer, 599-629. [Google Scholar] [CrossRef]
|
|
[24]
|
Rani, D. and Tripathi, S. (2023) Design of Blockchain-Based Authentication and Key Agreement Protocol for Health Data Sharing in Cooperative Hospital Network. The Journal of Supercomputing, 80, 2681-2717. [Google Scholar] [CrossRef]
|
|
[25]
|
Baldimtsi, F., Camenisch, J., Dubovitskaya, M., Lysyanskaya, A., Reyzin, L., Samelin, K., et al. (2017) Accumulators with Applications to Anonymity-Preserving Revocation. 2017 IEEE European Symposium on Security and Privacy (EuroS & P), Paris, 26-28 April 2017, 301-315. [Google Scholar] [CrossRef]
|