Two robust remote user authentication protocols using smart cards
With the rapid growth of electronic commerce and enormous demand from variants of
Internet based applications, strong privacy protection and robust system security have …
Internet based applications, strong privacy protection and robust system security have …
Survey on usable and secure two-factor authentication
BS Archana, A Chandrashekar… - 2017 2nd IEEE …, 2017 - ieeexplore.ieee.org
System resources are usually not retrieved through deception by users who are not legal.
This is basically ensured by Authentication. Text password is one of the forms of user …
This is basically ensured by Authentication. Text password is one of the forms of user …
Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password
With the increase in the number of e-services, there is a sharp increase in online financial
transactions these days. These services require a strong authentication scheme to validate …
transactions these days. These services require a strong authentication scheme to validate …
Globally order preserving multidimensional linear hashing
A Hutflesz, HW Six, P Widmayer - Fourth International Conference on …, 1988 - computer.org
Abstract Recently, Hsiang and Shih proposed remote user authentication scheme using
smart cards, they claims that their schemes defended against parallel session attack, and …
smart cards, they claims that their schemes defended against parallel session attack, and …
Replay detection in broadcasting sports video
An effective replay detection method for broadcasting sports videos is proposed in this
paper. The algorithm is composed of logos detection and replay recognition. Firstly, a logo …
paper. The algorithm is composed of logos detection and replay recognition. Firstly, a logo …
An improvement on remote user authentication schemes using smart cards
CL Chen, YY Deng, YW Tang, JH Chen, YF Lin - Computers, 2018 - mdpi.com
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart
cards; their claims were such that their schemes defended against ID-theft attacks, reply …
cards; their claims were such that their schemes defended against ID-theft attacks, reply …
A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services
Cloud computing is an emerging computing paradigm that offers computational facilities and
storage as services dynamically on demand basis via the Internet. The ability to scale …
storage as services dynamically on demand basis via the Internet. The ability to scale …
A Single Sign on based secure remote user authentication scheme for Multi-Server Environments
A Multi-Server Architecture comprises of a server environment having many different servers
which provides the user the flexibility of accessing resources from multiple Service Providing …
which provides the user the flexibility of accessing resources from multiple Service Providing …
An improvement of dynamic ID-based remote user authentication scheme with smart cards
Z Gao, Y Tu - 2008 7th World Congress on Intelligent Control …, 2008 - ieeexplore.ieee.org
Password authentication is the simplest and the most convenient authentication mechanism
that allows a legal user to login the remote system. In 2004, Das et al proposed a dynamic ID …
that allows a legal user to login the remote system. In 2004, Das et al proposed a dynamic ID …
A usable and secure two-factor authentication scheme
There are many secure authentication schemes that are secure but difficult to use. Most
existing network applications authenticate users with a username and password pair. Such …
existing network applications authenticate users with a username and password pair. Such …