A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017 | 370 | 2017 |
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo Journal of Network and Computer Applications 103, 194-204, 2018 | 355 | 2018 |
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar The Journal of Supercomputing 74 (12), 6428-6453, 2018 | 265 | 2018 |
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen Future Generation Computer Systems 82, 727-737, 2018 | 240 | 2018 |
A robust and energy efficient authentication protocol for industrial internet of things X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo IEEE Internet of Things Journal 5 (3), 1606-1615, 2017 | 204 | 2017 |
Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications X Li, S Liu, F Wu, S Kumari, JJPC Rodrigues IEEE Internet of Things Journal 6 (3), 4755-4763, 2018 | 194 | 2018 |
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das Journal of Network and Computer Applications 89, 72-85, 2017 | 189 | 2017 |
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan Future Generation Computer Systems 63, 56-75, 2016 | 173 | 2016 |
Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems F Wu, L Xu Journal of Medical Systems 37 (4), 1-9, 2013 | 171* | 2013 |
A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems X Li, J Peng, MS Obaidat, F Wu, MK Khan, C Chen IEEE Systems Journal 14 (1), 39-50, 2019 | 170 | 2019 |
Design of a provably secure biometrics-based multi-cloud-server authentication scheme S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen Future Generation Computer Systems 68, 320-330, 2017 | 163 | 2017 |
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks F Wu, L Xu, S Kumari, X Li Multimedia Systems 23, 195-205, 2017 | 152 | 2017 |
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security F Wu, L Xu, S Kumari, X Li Journal of Ambient Intelligence and Humanized Computing 8, 101-116, 2017 | 152 | 2017 |
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care L Xu, F Wu Journal of medical systems 39, 1-9, 2015 | 143 | 2015 |
A robust biometrics based three-factor authentication scheme for global mobility networks in smart city X Li, J Niu, S Kumari, F Wu, KKR Choo Future Generation Computer Systems 83, 607-618, 2018 | 141 | 2018 |
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks F Wu, L Xu, S Kumari, X Li Computers & Electrical Engineering 45, 274-285, 2015 | 136 | 2015 |
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems S Challa, AK Das, P Gope, N Kumar, F Wu, AV Vasilakos Future Generation Computer Systems 108, 1267-1286, 2020 | 133 | 2020 |
A lightweight privacy-preserving authentication protocol for VANETs X Li, T Liu, MS Obaidat, F Wu, P Vijayakumar, N Kumar IEEE Systems Journal 14 (3), 3547-3557, 2020 | 118 | 2020 |
Provably secure user authentication and key agreement scheme for wireless sensor networks AK Das, S Kumari, V Odelu, X Li, F Wu, X Huang Security and Communication Networks 9 (16), 3670-3687, 2016 | 102 | 2016 |
A new and secure authentication scheme for wireless sensor networks with formal proof F Wu, L Xu, S Kumari, X Li Peer-to-Peer Networking and Applications 10, 16-30, 2017 | 100 | 2017 |