Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

D Wang, N Wang, P Wang, S Qing - Information Sciences, 2015 - Elsevier
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …

An efficient and secure identity-based authentication and key agreement protocol with user anonymity for mobile devices

L Wu, Y Zhang, Y Xie, A Alelaiw, J Shen - Wireless Personal …, 2017 - Springer
Due to its convenience and simplicity, the mobile application in the mobile devices has been
widely used as necessary. As an essential way to provide secured communication between …

A secure and robust three-factor based authentication scheme using RSA cryptosystem

R Ali, AK Pal - … Journal of Business Data Communications and …, 2017 - igi-global.com
In remote user authentication, a server confirms the authenticity of a user via unreliable
channel. Several authentication protocols are devised in the literature relied on the identity …

A secure two-factor mutual authentication and session key agreement protocol using Elliptic curve cryptography

P Chandrakar, H Om - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a secure two-factor remote user authentication protocol using
Elliptic curve cryptography. The proposed protocol provides the mutual authentication of …

Robust two-factor smart card authentication

ÖM Candan, A Levi - 2017 IEEE International Black Sea …, 2017 - ieeexplore.ieee.org
Being very resilient devices, smart cards have been commonly used for two-factor
authentication schemes. However, the possibility of side-channel attacks renders private …

A secure three-factor remote user authentication scheme using elliptic curve cryptosystem

R Ali, AK Pal - Proceedings of the International Conference on …, 2018 - Springer
Recently, three factors such as biometric, smart card, and password based authentication
schemes have drawn considerable attention in the field of information security. In this paper …

An improved authentication and key agreement scheme for session initial protocol

L Wu, J Fan, Y Xie, J Wang - KSII Transactions on Internet and …, 2017 - koreascience.kr
Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the
voice over internet protocol. The security and efficiency are two urgent requirements and …