Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards

XM Wang, WF Zhang, JS Zhang, MK Khan - Computer Standards & …, 2007 - Elsevier
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards,
in which only few hashing operations are required. Later, Ku et al. gave an improved …

Enhanced three-factor security protocol for consumer USB mass storage devices

D He, N Kumar, JH Lee… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The Universal Serial Bus (USB) is an extremely popular interface standard for computer
peripheral connections and is widely used in consumer Mass Storage Devices (MSDs) …

Remote user authentication scheme using smart card: a review

M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …

An improved remote user authentication scheme with key agreement

S Kumari, MK Khan, X Li - Computers & Electrical Engineering, 2014 - Elsevier
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …

A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications

G Sharma, S Kalra - Journal of information security and applications, 2018 - Elsevier
With the rapid spread of cloud computing and ever increasing big data generated by Internet
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …

Security analysis and enhancements of an effective biometric‐based remote user authentication scheme using smart cards

Y An - BioMed Research International, 2012 - Wiley Online Library
Recently, many biometrics‐based user authentication schemes using smart cards have
been proposed to improve the security weaknesses in user authentication system. In 2011 …

A user anonymity preserving three-factor authentication scheme for telecare medicine information systems

Z Tan - Journal of medical systems, 2014 - Springer
The telecare medicine information system enables the patients gain health monitoring at
home and access medical services over internet or mobile networks. In recent years, the …

Advanced formal authentication protocol using smart cards for network applicants

T Limbasiya, M Soni, SK Mishra - Computers & Electrical Engineering, 2018 - Elsevier
The rapid growth of internet technologies has provided various functions that allow easy
remote user or customer access to its many systems. However, the responsibility of the …

Further observations on smart-card-based password-authenticated key agreement in distributed systems

X Huang, X Chen, J Li, Y **ang… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper initiates the study of two specific security threats on smart-card-based password
authentication in distributed systems. Smart-card-based password authentication is one of …

A secure remote user mutual authentication scheme using smart cards

M Karuppiah, R Saravanan - Journal of information security and …, 2014 - Elsevier
Authentication thwarts unauthorised users from accessing resources in insecure network
environments. Password authentication based on smart cards is one of the simplest and …