Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …
interest in the past two decades. While security-related issues have been well studied, how …
An efficient and secure identity-based authentication and key agreement protocol with user anonymity for mobile devices
Due to its convenience and simplicity, the mobile application in the mobile devices has been
widely used as necessary. As an essential way to provide secured communication between …
widely used as necessary. As an essential way to provide secured communication between …
A secure and robust three-factor based authentication scheme using RSA cryptosystem
In remote user authentication, a server confirms the authenticity of a user via unreliable
channel. Several authentication protocols are devised in the literature relied on the identity …
channel. Several authentication protocols are devised in the literature relied on the identity …
A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography
P Chandrakar, H Om - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a secure two-factor remote user authentication protocol using
Elliptic curve cryptography. The proposed protocol provides the mutual authentication of …
Elliptic curve cryptography. The proposed protocol provides the mutual authentication of …
Robust two-factor smart card authentication
ÖM Candan, A Levi - 2017 IEEE International Black Sea …, 2017 - ieeexplore.ieee.org
Being very resilient devices, smart cards have been commonly used for two-factor
authentication schemes. However, the possibility of side-channel attacks renders private …
authentication schemes. However, the possibility of side-channel attacks renders private …
A secure three-factor remote user authentication scheme using elliptic curve cryptosystem
Recently, three factors such as biometric, smart card, and password based authentication
schemes have drawn considerable attention in the field of information security. In this paper …
schemes have drawn considerable attention in the field of information security. In this paper …
An improved authentication and key agreement scheme for session initial protocol
L Wu, J Fan, Y Xie, J Wang - KSII Transactions on Internet and …, 2017 - koreascience.kr
Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the
voice over internet protocol. The security and efficiency are two urgent requirements and …
voice over internet protocol. The security and efficiency are two urgent requirements and …