Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …
research increasingly combining a user's biometrics with a password to design a remote …
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …
Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …
other and generate a session key for the subsequent communications. With the rapid …
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …
communication via unfavorable and insecure communication system. The authenticated …
Remote user authentication scheme using smart card: a review
M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …
authentication schemes using smart card proposed in the literature and each proposed …
Chaotic maps-based password-authenticated key agreement using smart cards
Password-based authenticated key agreement using smart cards has been widely and
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …
Improvement of robust smart‐card‐based password authentication scheme
Smart‐card‐based password authentication scheme is one of the commonly used
mechanisms to prevent unauthorized service and resource access and to remove the …
mechanisms to prevent unauthorized service and resource access and to remove the …
The request for better measurement: A comparative evaluation of two-factor authentication schemes
Despite over two decades of continuous efforts, how to design a secure and efficient two-
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …
Offline dictionary attack on password authentication schemes using smart cards
The design of secure and efficient smart-card-based password authentication schemes
remains a challenging problem today despite two decades of intensive research in the …
remains a challenging problem today despite two decades of intensive research in the …