Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards X Li, JW Niu, J Ma, WD Wang, CL Liu Journal of network and computer applications 34 (1), 73-79, 2011 | 273 | 2011 |
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards X Li, Y Xiong, J Ma, W Wang Journal of Network and Computer Applications 35 (2), 763-769, 2012 | 255 | 2012 |
An enhanced smart card based remote user password authentication scheme X Li, J Niu, MK Khan, J Liao Journal of Network and Computer Applications 36 (5), 1365-1371, 2013 | 239 | 2013 |
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment X Li, J Ma, W Wang, Y Xiong, J Zhang Mathematical and Computer Modelling 58 (1-2), 85-95, 2013 | 204 | 2013 |
A Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo Journal of Network and Computer Applications, 2018 | 175 | 2018 |
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta, KKR Choo Computer Networks 129, 429-443, 2017 | 167 | 2017 |
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2018 | 156 | 2018 |
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication K Mahmood, SA Chaudhry, H Naqvi, S Kumari, X Li, AK Sangaiah Future Generation Computer Systems 81, 557-565, 2018 | 111 | 2018 |
An improved remote user authentication scheme with key agreement S Kumari, MK Khan, X Li Computers & Electrical Engineering 40 (6), 1997-2012, 2014 | 110 | 2014 |
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps S Kumari, X Li, F Wu, AK Das, H Arshad, MK Khan Future Generation Computer Systems 63, 56-75, 2016 | 106 | 2016 |
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo, M Wazid, AK Das Journal of Network and Computer Applications 89, 72-85, 2017 | 104 | 2017 |
Design of a provably secure biometrics-based multi-cloud-server authentication scheme S Kumari, X Li, F Wu, AK Das, KKR Choo, J Shen Future Generation Computer Systems 68, 320-330, 2017 | 104 | 2017 |
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo IEEE Internet of Things Journal 5 (3), 1606-1615, 2018 | 99 | 2018 |
Medical JPEG image steganography based on preserving inter-block dependencies X Liao, J Yin, S Guo, X Li, AK Sangaiah Computers & Electrical Engineering 67, 320-329, 2018 | 97 | 2018 |
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers S Kumari, M Karuppiah, AK Das, X Li, F Wu, N Kumar The Journal of Supercomputing 74 (12), 6428-6453, 2018 | 95 | 2018 |
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks F Wu, L Xu, S Kumari, X Li Computers & Electrical Engineering 45, 274-285, 2015 | 95 | 2015 |
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu, J Shen Future Generation Computer Systems 82, 727-737, 2018 | 87 | 2018 |
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security F Wu, L Xu, S Kumari, X Li Journal of Ambient Intelligence and Humanized Computing 8 (1), 101-116, 2017 | 86 | 2017 |
Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update X Li, J Niu, J Liao, W Liang International Journal of Communication Systems 28 (2), 374-382, 2015 | 85 | 2015 |
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity X Li, J Niu, S Kumari, J Liao, W Liang, MK Khan Security and Communication Networks 9 (15), 2643-2655, 2016 | 83 | 2016 |