A Strong Mutual Authentication Protocol for Securing Wearable Smart Textile Applications. - Document - Gale Academic OneFile
![An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text](https://media.springernature.com/m685/springer-static/image/art%3A10.1186%2Fs13638-021-02022-1/MediaObjects/13638_2021_2022_Fig5_HTML.png)
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | EURASIP Journal on Wireless Communications and Networking | Full Text
GitHub - binhnguyen1984/scyther-abstraction: The Scyther-abstraction Tool for the symbolic analysis of security protocols
![Information | Free Full-Text | 5GAKA-LCCO: A Secure 5G Authentication and Key Agreement Protocol with Less Communication and Computation Overhead Information | Free Full-Text | 5GAKA-LCCO: A Secure 5G Authentication and Key Agreement Protocol with Less Communication and Computation Overhead](https://www.mdpi.com/information/information-13-00257/article_deploy/html/images/information-13-00257-g006.png)
Information | Free Full-Text | 5GAKA-LCCO: A Secure 5G Authentication and Key Agreement Protocol with Less Communication and Computation Overhead
![PDF) Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Hazem A . Elbaz - Academia.edu PDF) Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Hazem A . Elbaz - Academia.edu](https://0.academia-photos.com/attachment_thumbnails/80833140/mini_magick20220214-11808-2xgjy9.png?1644866160)
PDF) Analysis and Verification of a Key Agreement Protocol over Cloud Computing Using Scyther Tool | Hazem A . Elbaz - Academia.edu
![Information | Free Full-Text | Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things Information | Free Full-Text | Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things](https://www.mdpi.com/information/information-08-00136/article_deploy/html/images/information-08-00136-g002.png)
Information | Free Full-Text | Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things
![Simulation results of the Scyther tool. Figure includes two pictures.... | Download Scientific Diagram Simulation results of the Scyther tool. Figure includes two pictures.... | Download Scientific Diagram](https://www.researchgate.net/publication/353154511/figure/fig4/AS:1044070734495744@1625937269014/Simulation-results-of-the-Scyther-tool-Figure-includes-two-pictures-The-a-shows-the.png)