[1]
Lamport L. Password authentication with insecure communication. Commun ACM 1981; 24(11): 770-2.
[2]
He D, Bu J, Chan S, Chen C. Handauth: Efficient handover authentication with conditional privacy for wireless networks. IEEE Trans Comput 2013; 62(3): 616-22.
[3]
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible authentication protocol (EAP). Technical report 2004.
[4]
Rigney C, Willens S, Rubens A, Simpson W. Remote authentication dial in user service (RADIUS). Technical report 2000.
[5]
Metz C. AAA protocols: authentication, authorization, and accounting for the Internet. IEEE Internet Comput 1999; 3(6): 75-9.
[6]
Neuman BC, Kerberos TT. An authentication service for computer networks. IEEE Commun Mag 1994; 32(9): 33-8.
[7]
Cremers CJ. The scyther tool: Verification, falsification, and analysis of security protocols. In: International conference on computer aided verification Berlin, Heidelberg: Springer. 2008; pp. 414-8.
[8]
Armando A, Basin D, Boichut Y, et al. The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification Berlin, Heidelberg: Springer 2005 Jul 6. 281-5.
[9]
Amin R, Islam SH, Karati A, Biswas GP. Design of an enhanced authentication protocol and its verification using AVISPA. In: 2016 3rd international conference on recent advances in information technology (RAIT) Dhanbad, India: IEEE . 2016; pp. 404-9.
[10]
Mohammadali A, Haghighi MS, Tadayon MH, Mohammadi-Nodooshan A. A novel identity-based key establishment method for advanced metering infrastructure in smart grid IEEE T. Smart Grid 2018; 9(4): 2834-42.
[11]
Odelu V, Das AK, Goswami A. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms. IEEE Trans Consum Electron 2016; 62(1): 30-8.
[12]
Salekul I. Security analysis of LMAP using AVISPA. Int J Secur Netw 2014; 9(1): 30-9.
[13]
Shinde AH, Umbarkar AJ. Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA. Int J Comp Netw Inf Secur 2016; 8(3): 34.
[14]
He D, Chen C, Ma M, Chan S, Bu J. A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks. Int J Commun Syst 2013; 26(4): 495-504.
[15]
Armando A, Carbone R, Compagna L. Satmc: A Sat-based model checker for security protocols, business processes, and security apis. Int J Softw Tool 2016; 18(2): 187-204.
[16]
Basin D, Mödersheim S, Vigano L. OFMC: A symbolic model checker for security protocols. Int J Inf Secur 2005; 4(3): 181-208.
[17]
Das AK. A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 2015; 82(3): 1377-404.
[18]
Cremers C, Mauw S. Operational semantics and verification of security protocols Springer Science & Business Media 2012.Oct 30.
[19]
Ferro E, Potorti F. Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wirel Commun 2005; 12(1): 12-26.
[20]
Arash HL, Mir SD, Behrang S. Asurvey on wireless security protocols (wep, wpa and wpa2/802.11 i). In computer science and information technology, 2009 ICCSIT 2009 2nd IEEE international conference on, pages 48-52 IEEE, 2009.
[21]
Lee JY, Lin WC, Huang YH. A lightweight authentication protocol for internet of things In: 2014 international symposium on next-generation electronics (ISNE). Taipei City, Taiwan: IEEE 2014; pp. 1-2.
[22]
Dolev D, Yao A. On the security of public key protocols. IEEE Inform Theory 1983; 29(2): 198-208.