A dynamic ID-based remote user authentication scheme

ML Das, A Saxena, VP Gulati - IEEE transactions on Consumer …, 2004 - ieeexplore.ieee.org
Password-based authentication schemes are the most widely used techniques for remote
user authentication. Many static ID-based remote user authentication schemes both with and …

A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

A more efficient and secure dynamic ID-based remote user authentication scheme

Y Wang, J Liu, F Xiao, J Dan - Computer communications, 2009 - Elsevier
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication
scheme. This scheme allows users to change and choose passwords freely, and the server …

Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards

WC Ku, SM Chen - IEEE Transactions on Consumer Electronics, 2004 - ieeexplore.ieee.org
Recently, Chien et al. proposed an efficient remote authentication scheme using smart
cards. However, we find that their scheme is vulnerable to a reflection attack and an insider …

A modified remote user authentication scheme using smart cards

JJ Shen, CW Lin, MS Hwang - IEEE Transactions on Consumer …, 2003 - ieeexplore.ieee.org
Hwang and Li (see IEEE Trans. Consumer Electron., vol. 46, no. 1, p. 28-30, 2000) proposed
a new remote authentication scheme using smart cards. Their scheme is based on the …

An improved dynamic user authentication scheme for wireless sensor networks

HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …

A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks

CT Li, MS Hwang, YP Chu - Computer Communications, 2008 - Elsevier
Privacy and security should be paid much more attention in secure vehicular ad hoc
networks (VANETs). However, as far as we know, few researches on secure VANET …

A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

SKH Islam, GP Biswas - Journal of Systems and Software, 2011 - Elsevier
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …

A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications

G Sharma, S Kalra - Journal of information security and applications, 2018 - Elsevier
With the rapid spread of cloud computing and ever increasing big data generated by Internet
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …

An efficient and secure multi-server password authentication scheme using smart cards

CC Chang, JS Lee - 2004 international conference on …, 2004 - ieeexplore.ieee.org
With the rapid growth of computer networks and communication technologies, more and
more computers are linked together such that facilities can be shared through the networks …