![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and h...
-
Article
An efficient mutual authentication and key agreement scheme without password for wireless sensor networks
Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data collected by sensor nodes are usually relatively private and sen...
-
Article
A secure three-factor-based authentication with key agreement protocol for e-Health clouds
The rapid development of electronic healthcare (e-Health) has brought great convenience to people’s life. In order to guarantee the security of users, a large number of identity authentication protocols have b...
-
Article
Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks
The rapid development of wireless sensor networks (WSNs) has brought great convenience to people’s lives, as well as huge security challenges. Recently, Kaur et al. proposed an improved user authentication pro...