Dynamic ID-based remote user password authentication schemes using smart cards: A review

R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …

A secure dynamic identity based authentication protocol for multi-server architecture

SK Sood, AK Sarje, K Singh - Journal of Network and Computer …, 2011 - Elsevier
Most of the password based authentication protocols rely on single authentication server for
the user's authentication. User's verification information stored on the single server is a main …

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

MK Khan, SK Kim, K Alghathbar - Computer Communications, 2011 - Elsevier
Remote user authentication is a method, in which remote server verifies the legitimacy of a
user over an insecure communication channel. Currently, smart card-based remote user …

An improved dynamic user authentication scheme for wireless sensor networks

HR Tseng, RH Jan, W Yang - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
Over the last few years, many researchers have paid a lot of attention to the user
authentication problem. However, to date, there has been relatively little research suited for …

Cryptanalysis of password authentication schemes: Current status and key issues

SK Sood, AK Sarje, K Singh - 2009 Proceeding of International …, 2009 - ieeexplore.ieee.org
Password is the most commonly used technique for user authentication due to its simplicity
and convenience. The main advantage of passwords is that users can memorize them easily …

Strategy-driven methodology for reducing identity theft

S Madhogarhia - US Patent 7,761,384, 2010 - Google Patents
6,360,324 B2 3/2002 Van Blarkom A strategy-drlven methodology for reducmg 1dent1ty theft
6,405,245 B1 6/2002 Burson et al. comprises the steps of attempting to gain system access …

A secure and lightweight authentication scheme for next generation IoT infrastructure

M Rana, A Shafiq, I Altaf, M Alazab, K Mahmood… - Computer …, 2021 - Elsevier
While the 6G/IoT transition is on the cards, the real advantage of this transition can be
realized only if the user privacy and security are guaranteed. The smartcard and password …

An efficient and secure dynamic id-based authentication scheme for telecare medical information systems

HM Chen, JW Lo, CK Yeh - Journal of medical systems, 2012 - Springer
The rapidly increased availability of always-on broadband telecommunication environments
and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly …

An improved remote user authentication scheme with key agreement

S Kumari, MK Khan, X Li - Computers & Electrical Engineering, 2014 - Elsevier
In distributed systems, user authentication schemes based on password and smart card are
widely used to ensure only authorized access to the protected services. Recently, Chang et …

A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

SKH Islam, GP Biswas - Journal of Systems and Software, 2011 - Elsevier
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …