|
[1]
|
Yu, S.J., Park, K.S., Park, Y.H., Kim, H.P. and Park, Y.H. (2020) A Lightweight Three-Factor Authentication Protocol for Digital Rights Management System. Peer-to-Peer Networking and Applications, 13, 1340-1356. [Google Scholar] [CrossRef]
|
|
[2]
|
Lee, C.C., Li, C.T., Chen, Z.W. and Lai, Y.M. (2018) A Bio-metric-Based Authentication and Anonymity Scheme for Digital Rights Management System. Information Technology and Control, 47, 262-274. [Google Scholar] [CrossRef]
|
|
[3]
|
Subramanya, S.R. and Yi, B.K. (2008) Digital Rights Management. IEEE Potentials, 25, 31-34. [Google Scholar] [CrossRef]
|
|
[4]
|
Chang, I.P., Lee, T.F., Lin, T.H. and Liu, C.M. (2015) Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks. Sensors, 15, 29841-29854. [Google Scholar] [CrossRef] [PubMed]
|
|
[5]
|
Das, A.K., Wazid, M., Kumar, N., Khan, M.K., Choo, K.K.R. and Park, Y. (2017) Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environ-ment. IEEE Biomedical and Health Informatics, 22, 1310-1322. [Google Scholar] [CrossRef]
|
|
[6]
|
Yu, S., Lee, J., Lee, K., Park, K. and Park, Y. (2018) Secure Au-thentication Protocol for Wireless Sensor Networks in Vehicular Communications. Sensors, 18, 3191. [Google Scholar] [CrossRef] [PubMed]
|
|
[7]
|
Li, C.T. and Hwang, M.S. (2010) An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards. Network and Computer Applications, 33, 1-5. [Google Scholar] [CrossRef]
|
|
[8]
|
Zhu, H. and Zhang, Y. (2017) An Efficient Chaotic Maps-Based Deniable Authentication Group Key Agreement Protocol. Wireless Personal Communications, 96, 217-229. [Google Scholar] [CrossRef]
|
|
[9]
|
Wazid, M., Das, A.K., Kumari, S., Li, X. and Wu, F. (2016) De-sign of an Efficient and Provably Secure Anonymity Preserving Three-Factor User Authentication and Key Agreement Scheme for TMIS. Secure Communication Network, 9, 1983-2001. [Google Scholar] [CrossRef]
|
|
[10]
|
Mishra, D., Das, A.K. and Mukhopadhyay, S. (2015) An Anonymous and Secure Biometric-Based Enterprise Digital Rights Management System for Mobile Environment. Secure Communication Network, 8, 3383-3404. [Google Scholar] [CrossRef]
|
|
[11]
|
Chang, C.C., Chang, S.C. and Yang, J.H. (2013) A Practical Secure and Ef-ficient Enterprise Digital Rights Management Mechanism Suitable for Mobile Environment. Secure Communication Network, 6, 972-984. [Google Scholar] [CrossRef]
|
|
[12]
|
Ali, Z., Ghani, A., Khan, I., Chaudhry, S.A., Islam, S.H. and Giri, D. (2020) A Robust Authentication and Access Control Protocol for Securing Wireless Healthcare Sensor Networks. Journal of Information Security and Applications, 52, Article ID: 102502. [Google Scholar] [CrossRef]
|
|
[13]
|
Aghili, S.F., Mala, H., Shojafar, M. and Peris-Lopez, P. (2019) LACO: Lightweight Three-Factor Authentication, AccessControl and Ownership Transfer Scheme for E-Health Systems in IoT. Future Generation Computer Systems, 96, 410-424. [Google Scholar] [CrossRef]
|
|
[14]
|
屈娟, 冯玉明, 李艳平, 李丽. 可证明安全的面向无线传感器网络的三因素认证及密钥协商方案[J]. 通信学报, 2018, 39(S2): 189-197.
|
|
[15]
|
Chen, L. and Zhang, K. (2020) Privacy-Aware Smart Card Based Biometric Authentication Scheme for e-Health. Peer-to-Peer Networking and Applications, 2, 1-13.
|
|
[16]
|
Kumar, P. and Chouhan, L. (2021) A Privacy and Session Key Based Authentication Scheme for Medical IoT Networks. Computer Communications, 166, 154-164. [Google Scholar] [CrossRef]
|