A secure dynamic ID based remote user authentication scheme for multi-server environment
YP Liao, SS Wang - Computer Standards & Interfaces, 2009 - Elsevier
Since the number of server providing the facilities for the user is usually more than one, the
authentication protocols for multi-server environment are required for practical applications …
authentication protocols for multi-server environment are required for practical applications …
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
HC Hsiang, WK Shih - Computer Standards & Interfaces, 2009 - Elsevier
Recently, Liao and Wang proposed a secure dynamic ID based remote user authentication
scheme for multi-server environment, and claimed that their scheme was intended to provide …
scheme for multi-server environment, and claimed that their scheme was intended to provide …
[HTML][HTML] A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
Traditional password based authentication schemes are mostly considered in single-server
environments. They are unfit for the multi-server environments from two aspects. Recently …
environments. They are unfit for the multi-server environments from two aspects. Recently …
Understanding security failures of multi-factor authentication schemes for multi-server environments
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …
authentication protocol for 5G networks and confirmed the security of their protocol against …
Three‐factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
CC Lee, CT Chen, PH Wu… - IET Computers & Digital …, 2013 - Wiley Online Library
This study proposes a three‐factor control protocol for universal serial bus (USB) on an
elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number …
elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number …
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
An authentication scheme handling multiple servers offers a feasible environment to users to
conveniently access the rightful services from various servers using one-time registration …
conveniently access the rightful services from various servers using one-time registration …
An efficient and secure multi-server authentication scheme with key agreement
Remote user authentication is used to validate the legitimacy of a remote log-in user. Due to
the rapid growth of computer networks, many network environments have been becoming …
the rapid growth of computer networks, many network environments have been becoming …
A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security
The widespread popularity of the computer networks has triggered concerns about
information security. Password-based user authentication with key agreement protocols …
information security. Password-based user authentication with key agreement protocols …
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Two user authentication schemes for multi-server environments have been proposed by
Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes …
Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes …