Dynamic ID-based remote user password authentication schemes using smart cards: A review
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …
legitimacy of a user over an insecure communication channel. Until now, there have been …
A secure dynamic identity based authentication protocol for multi-server architecture
Most of the password based authentication protocols rely on single authentication server for
the user's authentication. User's verification information stored on the single server is a main …
the user's authentication. User's verification information stored on the single server is a main …
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
MK Khan, SK Kim, K Alghathbar - Computer Communications, 2011 - Elsevier
Remote user authentication is a method, in which remote server verifies the legitimacy of a
user over an insecure communication channel. Currently, smart card-based remote user …
user over an insecure communication channel. Currently, smart card-based remote user …
An improved dynamic user authentication scheme for wireless sensor networks
HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …
authentication problem. However, to date, there has been relatively little research suited for …
Cryptanalysis of password authentication schemes: Current status and key issues
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …
and convenience. The main advantage of passwords is that users can memorize them easily …
Strategy-driven methodology for reducing identity theft
S Madhogarhia - US Patent 7,761,384, 2010 - Google Patents
6,360,324 B2 3/2002 Van Blarkom A strategy-drlven methodology for reducmg 1dent1ty theft
6,405,245 B1 6/2002 Burson et al. comprises the steps of attempting to gain system access …
6,405,245 B1 6/2002 Burson et al. comprises the steps of attempting to gain system access …
A secure and lightweight authentication scheme for next generation IoT infrastructure
While the 6G/IoT transition is on the cards, the real advantage of this transition can be
realized only if the user privacy and security are guaranteed. The smartcard and password …
realized only if the user privacy and security are guaranteed. The smartcard and password …
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
HM Chen, JW Lo, CK Yeh - Journal of medical systems, 2012 - Springer
The rapidly increased availability of always-on broadband telecommunication environments
and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly …
and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly …
An improved remote user authentication scheme with key agreement
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …
widely used to ensure only authorized access to the protected services. Recently, Chang et …
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …
curve cryptography for the users of mobile devices. We have analyzed the security aspects …