Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018‏ - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

Dynamic ID-based remote user password authentication schemes using smart cards: A review

R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012‏ - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016‏ - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT

BD Deebak, F Al-Turjman, M Aloqaily, O Alfandi - IEEE Access, 2019‏ - ieeexplore.ieee.org
Emerging technologies rapidly change the essential qualities of modern societies in terms of
smart environments. To utilize the surrounding environment data, tiny sensing devices and …

Zipf's law in passwords

D Wang, H Cheng, P Wang, X Huang… - IEEE Transactions on …, 2017‏ - ieeexplore.ieee.org
Despite three decades of intensive research efforts, it remains an open question as to what
is the underlying distribution of user-generated passwords. In this paper, we make a …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018‏ - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014‏ - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

An enhanced smart card based remote user password authentication scheme

X Li, J Niu, MK Khan, J Liao - Journal of Network and Computer …, 2013‏ - Elsevier
Smart card based password authentication is one of the simplest and efficient authentication
mechanisms to ensure secure communication in insecure network environments. Recently …