[1] |
JEONG J, CHUNG M Y, CHOO H. Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks[C]// IEEE. The 41st Annual Hawaii International Conference on System Sciences(HICSS 2008). New York: IEEE, 2008: 123-133.
|
[2] |
VAIDYA B, PARK J H, YEO S, et al. Robust One-Time Password Authentication Scheme Using Smart Card for Home Network Environment[J]. Computer Communications, 2011, 34(3): 326-336.
doi: 10.1016/j.comcom.2010.03.013
URL
|
[3] |
KIM H J, KIM H S. AUTHHOTP-HOTP Based Authentication Scheme over Home Network Environment[C]// Springer. International Conference on Computational Science and Its Applications. Heidelberg: Springer, 2011: 622-637.
|
[4] |
HANUMANTHAPPA P, SINGH S. Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices Using Secure Three Way Authentication[C]// IEEE. 2012 International Conference on Innovations in Information Technology(IIT). New York: IEEE, 2012: 107-112.
|
[5] |
KUMAR P, GURTOV A, IINATTI J, et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments[J]. IEEE Sensors Journal, 2016, 16(1): 254-264.
doi: 10.1109/JSEN.2015.2475298
URL
|
[6] |
VISHWAKARMA S K, UPADHYAYA P, KUMARI B, et al. Smart Energy Efficient Home Automation System Using IoT[C]// IEEE. 4th International Conference on Internet of Things:Smart Innovation and Usages(IoT-SIU). New York: IEEE, 2019: 1-4.
|
[7] |
WAZID M, DAS A K, ODELU V, et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 17(2): 391-406.
doi: 10.1109/TDSC.8858
URL
|
[8] |
SAHOO S S, MOHANTY S, SAHOO K S, et al. A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System[J]. IEEE Internet of Things Journal, 2023, 10(17): 15087-15099.
doi: 10.1109/JIOT.2023.3264565
URL
|
[9] |
ZHANG Min, XU Chunxiang, ZHANG Jianhua. Research on Authentication Key Agreement Protocol Based on Multi-Factor in Internet of Drones[J]. Netinfo Security, 2022, 22(9): 21-30.
|
|
张敏, 许春香, 张建华. 无人机网络中基于多因子的认证密钥协商协议研究[J]. 信息网络安全, 2022, 22(9):21-30.
|
[10] |
DODIS Y, REYZIN L, SMITH A. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data[C]// Springer. EUROCRYPT 2004. Heidelberg: Springer, 2004: 524-540.
|
[11] |
RIVLIN T J. Chebyshev Polynomials[M]. New York: Courier Dover Publications, 2020.
|
[12] |
ZHANG Linhua. Cryptanalysis of the Public Key Encryption Based on Multiple Chaotic Systems[J]. Chaos Solitons & Fractals, 2008, 37(3): 669-674.
doi: 10.1016/j.chaos.2006.09.047
URL
|
[13] |
ZHU Yixin, MIAO Zhangwang, GAN Jinghong, et al. Design of Ransomware Defense System Based on Fine-Grained Access Control Scheme[J]. Netinfo Security, 2023, 23(10): 31-38.
|
|
朱怡昕, 苗张旺, 甘静鸿, 等. 基于细粒度访问控制的勒索软件防御系统设计[J]. 信息网络安全, 2023, 23(10):31-38.
|
[14] |
GAO Bo, CHEN Lin, YAN Yingjian. Research on Side Channel Attack Based on CNN-MGU[J]. Netinfo Security, 2022, 22(8): 55-63.
|
|
高博, 陈琳, 严迎建. 基于CNN-MGU的侧信道攻击研究[J]. 信息网络安全, 2022, 22(8):55-63.
|
[15] |
FAR H, BAYAT M, DAS A K, et al. Pournaghi, and M. Doostari, LAPTAS: Lightweight Anonymous Privacy-Preserving Three-Factor Authentication Scheme for WSN-Based IIoT[J]. Wireless Network, 2021, 27(2): 1389-1412.
doi: 10.1007/s11276-020-02523-9
|
[16] |
LI Xiong, PENG Jieyao, OBAIDAT M S, et al. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems[J]. IEEE Systems Journal, 2020, 14(1): 39-50.
doi: 10.1109/JSYST.4267003
URL
|
[17] |
ZOU Shihong, CAO Qiang, WANG Chenxu. A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT[J]. IEEE Systems Journal, 2022, 16(3): 4938-4949.
doi: 10.1109/JSYST.2021.3127438
URL
|