Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards,
in which only few hashing operations are required. Later, Ku et al. gave an improved …
in which only few hashing operations are required. Later, Ku et al. gave an improved …
Enhanced three-factor security protocol for consumer USB mass storage devices
The Universal Serial Bus (USB) is an extremely popular interface standard for computer
peripheral connections and is widely used in consumer Mass Storage Devices (MSDs) …
peripheral connections and is widely used in consumer Mass Storage Devices (MSDs) …
Remote user authentication scheme using smart card: a review
M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …
authentication schemes using smart card proposed in the literature and each proposed …
An improved remote user authentication scheme with key agreement
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …
widely used to ensure only authorized access to the protected services. Recently, Chang et …
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications
With the rapid spread of cloud computing and ever increasing big data generated by Internet
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
Security analysis and enhancements of an effective biometric‐based remote user authentication scheme using smart cards
Y An - BioMed Research International, 2012 - Wiley Online Library
Recently, many biometrics‐based user authentication schemes using smart cards have
been proposed to improve the security weaknesses in user authentication system. In 2011 …
been proposed to improve the security weaknesses in user authentication system. In 2011 …
A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
Z Tan - Journal of medical systems, 2014 - Springer
The telecare medicine information system enables the patients gain health monitoring at
home and access medical services over internet or mobile networks. In recent years, the …
home and access medical services over internet or mobile networks. In recent years, the …
Advanced formal authentication protocol using smart cards for network applicants
T Limbasiya, M Soni, SK Mishra - Computers & Electrical Engineering, 2018 - Elsevier
The rapid growth of internet technologies has provided various functions that allow easy
remote user or customer access to its many systems. However, the responsibility of the …
remote user or customer access to its many systems. However, the responsibility of the …
Further observations on smart-card-based password-authenticated key agreement in distributed systems
This paper initiates the study of two specific security threats on smart-card-based password
authentication in distributed systems. Smart-card-based password authentication is one of …
authentication in distributed systems. Smart-card-based password authentication is one of …
A secure remote user mutual authentication scheme using smart cards
Authentication thwarts unauthorised users from accessing resources in insecure network
environments. Password authentication based on smart cards is one of the simplest and …
environments. Password authentication based on smart cards is one of the simplest and …