A dynamic ID-based remote user authentication scheme
Password-based authentication schemes are the most widely used techniques for remote
user authentication. Many static ID-based remote user authentication schemes both with and …
user authentication. Many static ID-based remote user authentication schemes both with and …
A survey of authentication schemes in telecare medicine information systems
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …
information of the users are stored at a remote server (Telecare Medical Information System) …
A more efficient and secure dynamic ID-based remote user authentication scheme
Y Wang, J Liu, F Xiao, J Dan - Computer communications, 2009 - Elsevier
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication
scheme. This scheme allows users to change and choose passwords freely, and the server …
scheme. This scheme allows users to change and choose passwords freely, and the server …
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
WC Ku, SM Chen - IEEE Transactions on Consumer Electronics, 2004 - ieeexplore.ieee.org
Recently, Chien et al. proposed an efficient remote authentication scheme using smart
cards. However, we find that their scheme is vulnerable to a reflection attack and an insider …
cards. However, we find that their scheme is vulnerable to a reflection attack and an insider …
A modified remote user authentication scheme using smart cards
JJ Shen, CW Lin, MS Hwang - IEEE Transactions on Consumer …, 2003 - ieeexplore.ieee.org
Hwang and Li (see IEEE Trans. Consumer Electron., vol. 46, no. 1, p. 28-30, 2000) proposed
a new remote authentication scheme using smart cards. Their scheme is based on the …
a new remote authentication scheme using smart cards. Their scheme is based on the …
An improved dynamic user authentication scheme for wireless sensor networks
HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …
authentication problem. However, to date, there has been relatively little research suited for …
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
Privacy and security should be paid much more attention in secure vehicular ad hoc
networks (VANETs). However, as far as we know, few researches on secure VANET …
networks (VANETs). However, as far as we know, few researches on secure VANET …
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …
curve cryptography for the users of mobile devices. We have analyzed the security aspects …
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications
With the rapid spread of cloud computing and ever increasing big data generated by Internet
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
An efficient and secure multi-server password authentication scheme using smart cards
CC Chang, JS Lee - 2004 international conference on …, 2004 - ieeexplore.ieee.org
With the rapid growth of computer networks and communication technologies, more and
more computers are linked together such that facilities can be shared through the networks …
more computers are linked together such that facilities can be shared through the networks …