Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

MC Chuang, MC Chen - Expert Systems with Applications, 2014 - Elsevier
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model

Q **e, DS Wong, G Wang, X Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

A Kumari, S Jangirala, MY Abbasi, V Kumar… - Journal of Information …, 2020 - Elsevier
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …

Remote user authentication scheme using smart card: a review

M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …

Chaotic maps-based password-authenticated key agreement using smart cards

C Guo, CC Chang - Communications in Nonlinear Science and Numerical …, 2013 - Elsevier
Password-based authenticated key agreement using smart cards has been widely and
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …

Improvement of robust smart‐card‐based password authentication scheme

Q Jiang, J Ma, G Li, X Li - International Journal of …, 2015 - Wiley Online Library
Smart‐card‐based password authentication scheme is one of the commonly used
mechanisms to prevent unauthorized service and resource access and to remove the …

The request for better measurement: A comparative evaluation of two-factor authentication schemes

D Wang, Q Gu, H Cheng, P Wang - Proceedings of the 11th ACM on …, 2016 - dl.acm.org
Despite over two decades of continuous efforts, how to design a secure and efficient two-
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …

Offline dictionary attack on password authentication schemes using smart cards

D Wang, P Wang - … Security: 16th International Conference, ISC 2013 …, 2015 - Springer
The design of secure and efficient smart-card-based password authentication schemes
remains a challenging problem today despite two decades of intensive research in the …