A secure three-factor authentication scheme for IoT environments

AHG Mirsaraei, A Barati, H Barati - Journal of Parallel and Distributed …, 2022 - Elsevier
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an
inevitable issue in the IoT. The currently existing authentication methods are subjected to …

[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment

U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …

A provably secure authentication and key exchange protocol in vehicular ad hoc networks

TY Wu, Z Lee, L Yang, CM Chen - Security and Communication …, 2021 - Wiley Online Library
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …

A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …

A biometric based remote user authentication technique using smart card in multi-server environment

S Kandar, S Pal, BC Dhara - Wireless Personal Communications, 2021 - Springer
Remote user authentication is an efficient technique to perform secure communication over
an insecure network. In this current research article, a lightweight remote user authentication …

Secure and efficient user authentication scheme based on password and smart card for multiserver environment

Y Zhao, S Li, L Jiang - Security and Communication Networks, 2018 - Wiley Online Library
The rapid development of information and network technologies motivates the emergence of
various new computing paradigms, such as distributed computing, cloud computing, and …

Elliptic curve signcryption-based mutual authentication protocol for smart cards

AK Singh, A Solanki, A Nayyar, B Qureshi - Applied Sciences, 2020 - mdpi.com
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …

A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity

H Xiong, Z Kang, J Chen, J Tao, C Yuan… - IEEE Systems …, 2020 - ieeexplore.ieee.org
As the indispensable part of the security demand in a distributed system, a variety of online
services need to be protected from unauthorized access. Multiserver authentication (MA) is …

Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era

D Bakkiam Deebak… - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data
processing and analysis to fulfill the essential characteristics of seamless computing …

Security Enhancement of biometric-based authentication systems using smart card

H Kim - IEEE Access, 2024 - ieeexplore.ieee.org
Remote authentication has been extensively studied over the past few decades, with
password-based authentication being a common approach since Lamport's 1981 proposal …