Dynamic ID-based remote user password authentication schemes using smart cards: A review

R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …

A secure dynamic identity based authentication protocol for multi-server architecture

SK Sood, AK Sarje, K Singh - Journal of Network and Computer …, 2011 - Elsevier
Most of the password based authentication protocols rely on single authentication server for
the user's authentication. User's verification information stored on the single server is a main …

Cryptanalysis of password authentication schemes: Current status and key issues

SK Sood, AK Sarje, K Singh - 2009 Proceeding of International …, 2009 - ieeexplore.ieee.org
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …

A secure and lightweight authentication scheme for next generation IoT infrastructure

M Rana, A Shafiq, I Altaf, M Alazab, K Mahmood… - Computer …, 2021 - Elsevier
While the 6G/IoT transition is on the cards, the real advantage of this transition can be
realized only if the user privacy and security are guaranteed. The smartcard and password …

An improved remote user authentication scheme with key agreement

S Kumari, MK Khan, X Li - Computers & Electrical Engineering, 2014 - Elsevier
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …

Design of an anonymity-preserving group formation based authentication protocol in global mobility networks

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
Remote user authentication without compromising user anonymity is an emerging area in
the last few years. In this paper, we propose a new anonymity preserving mobile user …

SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments

NMR Lwamo, L Zhu, C Xu, K Sharif, X Liu, C Zhang - Information Sciences, 2019 - Elsevier
The rapid increase in user base and technological penetration has enabled the use of a
wide range of devices and applications. The services are rendered to these devices from …

Improved dynamic id-based authentication scheme for telecare medical information systems

T Cao, J Zhai - Journal of medical systems, 2013 - Springer
In order to protect users' identity privacy, Chen et al. proposed an efficient dynamic ID-based
authentication scheme for telecare medical information systems. However, Chen et al.'s …

Security enhancement of an improved remote user authentication scheme with key agreement

SD Kaul, AK Awasthi - Wireless Personal Communications, 2016 - Springer
Abstract In 2014, Kumari, Khan and Li proposed smart card based secure and robust remote
user authentication scheme with key agreement and claimed that their scheme is suitable …

Chaotic map based mobile dynamic ID authenticated key agreement scheme

HY Lin - Wireless Personal Communications, 2014 - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …