Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
The rapid development of wireless sensor networks (WSNs) has brought great convenience to people’s lives, as well as huge security challenges. Recently, Kaur et al. proposed an improved user authentication pro...
-
Article
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and h...