Two robust remote user authentication protocols using smart cards

KH Yeh, C Su, NW Lo, Y Li, YX Hung - Journal of Systems and Software, 2010 - Elsevier
With the rapid growth of electronic commerce and enormous demand from variants of
Internet based applications, strong privacy protection and robust system security have …

Survey on usable and secure two-factor authentication

BS Archana, A Chandrashekar… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
System resources are usually not retrieved through deception by users who are not legal.
This is basically ensured by Authentication. Text password is one of the forms of user …

Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password

KM Quadry, A Govardhan… - International Journal of …, 2021 - search.proquest.com
With the increase in the number of e-services, there is a sharp increase in online financial
transactions these days. These services require a strong authentication scheme to validate …

Globally order preserving multidimensional linear hashing

A Hutflesz, HW Six, P Widmayer - Fourth International Conference on …, 1988 - computer.org
Abstract Recently, Hsiang and Shih proposed remote user authentication scheme using
smart cards, they claims that their schemes defended against parallel session attack, and …

Replay detection in broadcasting sports video

X Tong, H Lu, Q Liu, H ** - … on Image and Graphics (ICIG'04), 2004 - ieeexplore.ieee.org
An effective replay detection method for broadcasting sports videos is proposed in this
paper. The algorithm is composed of logos detection and replay recognition. Firstly, a logo …

An improvement on remote user authentication schemes using smart cards

CL Chen, YY Deng, YW Tang, JH Chen, YF Lin - Computers, 2018 - mdpi.com
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart
cards; their claims were such that their schemes defended against ID-theft attacks, reply …

A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services

S Binu, M Misbahuddin, P Raj - Computer and Network Security …, 2018 - Springer
Cloud computing is an emerging computing paradigm that offers computational facilities and
storage as services dynamically on demand basis via the Internet. The ability to scale …

A Single Sign on based secure remote user authentication scheme for Multi-Server Environments

S Binu, M Misbahuddin, P Raj - International Conference on …, 2014 - ieeexplore.ieee.org
A Multi-Server Architecture comprises of a server environment having many different servers
which provides the user the flexibility of accessing resources from multiple Service Providing …

An improvement of dynamic ID-based remote user authentication scheme with smart cards

Z Gao, Y Tu - 2008 7th World Congress on Intelligent Control …, 2008 - ieeexplore.ieee.org
Password authentication is the simplest and the most convenient authentication mechanism
that allows a legal user to login the remote system. In 2004, Das et al proposed a dynamic ID …

A usable and secure two-factor authentication scheme

S Akram, M Misbahuddin… - … Security Journal: A Global …, 2012 - Taylor & Francis
There are many secure authentication schemes that are secure but difficult to use. Most
existing network applications authenticate users with a username and password pair. Such …