Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018 - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Q Jiang, S Zeadally, J Ma, D He - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …

“It's not actually that horrible” Exploring Adoption of Two-Factor Authentication at a University

J Colnago, S Devlin, M Oates, C Swoopes… - Proceedings of the …, 2018 - dl.acm.org
Despite the additional protection it affords, two-factor authentication (2FA) adoption
reportedly remains low. To better understand 2FA adoption and its barriers, we observed the …

Secure multifactor authenticated key agreement scheme for industrial IoT

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …

On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services

S Roy, S Chatterjee, AK Das, S Chattopadhyay… - IEEE …, 2017 - ieeexplore.ieee.org
Secure and efficient lightweight user authentication protocol for mobile cloud computing
becomes a paramount concern due to the data sharing using Internet among the end users …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices

D Wang, H Cheng, D He, P Wang - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Providing secure, efficient, and privacy-preserving user authentication in mobile networks is
a challenging problem due to the inherent mobility of users, variety of attack vectors, and …