Wireless Communications and Mobile Computing / 2017 / Article / Tab 1

Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 1

Comparison of protection of privacy.

SchemesSensor anonymityUser anonymityShared key privacy

Choi et al. [1]××
Shi and Gong [2]××
Chang and Le [3, Scheme 1]×××
Chang and Le [3, Scheme 2]××
Wu et al. [4]×
Das et al. [5]×
Jung et al. [6]××
Fan et al. [7]×××
Amin and Biswas [8]×××
Nam et al. [9]××
Lu et al. [10]×
Zhao et al. [11]××
Hou et al. [12]×××
Farash et al. [13]×××
Turkanović et al. [14]×××

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.