Dynamic ID-based remote user password authentication schemes using smart cards: A review
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …
legitimacy of a user over an insecure communication channel. Until now, there have been …
A secure dynamic identity based authentication protocol for multi-server architecture
Most of the password based authentication protocols rely on single authentication server for
the user's authentication. User's verification information stored on the single server is a main …
the user's authentication. User's verification information stored on the single server is a main …
Cryptanalysis of password authentication schemes: Current status and key issues
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …
and convenience. The main advantage of passwords is that users can memorize them easily …
A secure and lightweight authentication scheme for next generation IoT infrastructure
While the 6G/IoT transition is on the cards, the real advantage of this transition can be
realized only if the user privacy and security are guaranteed. The smartcard and password …
realized only if the user privacy and security are guaranteed. The smartcard and password …
An improved remote user authentication scheme with key agreement
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …
widely used to ensure only authorized access to the protected services. Recently, Chang et …
Design of an anonymity-preserving group formation based authentication protocol in global mobility networks
Remote user authentication without compromising user anonymity is an emerging area in
the last few years. In this paper, we propose a new anonymity preserving mobile user …
the last few years. In this paper, we propose a new anonymity preserving mobile user …
SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments
The rapid increase in user base and technological penetration has enabled the use of a
wide range of devices and applications. The services are rendered to these devices from …
wide range of devices and applications. The services are rendered to these devices from …
Improved dynamic id-based authentication scheme for telecare medical information systems
T Cao, J Zhai - Journal of medical systems, 2013 - Springer
In order to protect users' identity privacy, Chen et al. proposed an efficient dynamic ID-based
authentication scheme for telecare medical information systems. However, Chen et al.'s …
authentication scheme for telecare medical information systems. However, Chen et al.'s …
Security enhancement of an improved remote user authentication scheme with key agreement
Abstract In 2014, Kumari, Khan and Li proposed smart card based secure and robust remote
user authentication scheme with key agreement and claimed that their scheme is suitable …
user authentication scheme with key agreement and claimed that their scheme is suitable …
Chaotic map based mobile dynamic ID authenticated key agreement scheme
HY Lin - Wireless Personal Communications, 2014 - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …
security requirement. Yet, conventional authenticated key agreement using static ID cannot …