User:Madssnake/Mutual authentication/Bibliography

Bibliography Page
This is where you will compile the bibliography for your Wikipedia assignment. Please refer to the following resources for help:


 * Adding citations
 * Evaluating articles and sources

Mutual Authentication Bibliography

 * 1) Amin, Ruhul, Sk Hafizul Islam, Pandi Vijayakumar, Muhammad Khurram Khan, and Victor Chang. 2017. “A Robust and Efficient Bilinear Pairing Based Mutual Authentication and Session Key Verification over Insecure Communication.” Multimedia Tools and Applications 77(9):11041–66.
 * 2) Anandhi, S., R. Anitha, and Venkatasamy Sureshkumar. 2020. “An Authentication Protocol to Track an Object with Multiple RFID Tags Using Cloud Computing Environment.” Wireless Personal Communications 113(4):2339–61.
 * 3) Chen, Chi-Tung, Cheng-Chi Lee, and Iuon-Chang Lin. 2020. “Efficient and Secure Three-Party Mutual Authentication Key Agreement Protocol for WSNs in IoT Environments.” Plos One 15(4).
 * 4) Chen, Chin-Ling, Mao-Lun Chiang, Hui-Ching Hsieh, Ching-Cheng Liu, and Yong-Yuan Deng. 2020. “A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing.” Wireless Personal Communications 113(1):575–98.
 * 5) Chen, Liquan, Sijie Qian, Ming Lim, and Shihui Wang. 2018. “An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems.” China Communications 15(5):61–76.
 * 6) Chen, Yulei and Jianhua Chen. 2020. “A Secure Three-Factor-Based Authentication with Key Agreement Protocol for e-Health Clouds.” The Journal of Supercomputing: An International Journal of High-Performance Computer Design, Analysis, and Use 1–22.
 * 7) Choudhary, Karanjeet, Gurjot Singh Gaba, Ismail Butun, and Pardeep Kumar. 2020. “MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things.” Sensors 20(18):5166.
 * 8) Dewanta, Favian and Masahiro Mambo. 2019. “A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment.” IEEE Access 7:103095–114.
 * 9) Guo, Fuchun, Yi Mu, Willy Susilo, and Vijay Varadharajan. 2017. “Privacy-Preserving Mutual Authentication in RFID with Designated Readers.” Wireless Personal Communications 96(3):4819–45.
 * 10) Hsu, Chien-Lung, Hsiao-Chen Liu, and Ming-Tzu Chou. 2007. “Remote Mutual Authentication Scheme with Key Agreement Using Smart Cards.” International Mathematical Forum 2:1381–97.
 * 11) Jan, Mian Ahmad, Fazlullah Khan, Muhammad Alam, and Muhammad Usman. 2019. “A Payload-Based Mutual Authentication Scheme for Internet of Things.” Future Generation Computer Systems 92:1028–39.
 * 12) Karuppiah, Marimuthu and R. Saravanan. 2015. “Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme Using Smart Cards.” Journal of Discrete Mathematical Sciences and Cryptography 18(5):623–49.
 * 13) Karuppiah, Marimuthu et al. 2018. “Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment.” Mobile Networks and Applications 24(3):1046–62.
 * 14) Liu, Xiaoxue, Wenping Ma, and Hao Cao. 2019. “MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture.” IEEE Access 7:149282–98.
 * 15) Liu, Xiaoxue, Wenping Ma, and Hao Cao. 2019. “NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.” Journal of Medical Systems 43(10).
 * 16) Lopes, Ana Paula G. and Paulo R. L. Gondim. 2020. “Mutual Authentication Protocol for D2D Communications in a Cloud-Based E-Health System.” Sensors 20(7):2072.
 * 17) Narwal, Bhawna and Amar Kumar Mohapatra. 2020. “SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks.” Wireless Personal Communications 113(4):1985–2008.
 * 18) Sahoo, Shreeya Swagatika, Sujata Mohanty, and Banshidhar Majhi. 2019. “Improved Biometric-Based Mutual Authentication and Key Agreement Scheme Using ECC.” Wireless Personal Communications 111(2):991–1017.
 * 19) Sasikaladevi, N. and D. Malathi. 2019. “Energy Efficient Lightweight Mutual Authentication Protocol (REAP) for MBAN Based on Genus-2 Hyper-Elliptic Curve.” Wireless Personal Communications 109(4):2471–88.
 * 20) Sharma, Mohit Kr and Manisha J. Nene. 2020. “Two‐Factor Authentication Using Biometric Based Quantum Operations.” Security and Privacy 3(3).