Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Robust biometrics-based authentication scheme for multiserver environment

D He, D Wang - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
The authentication scheme is an important cryptographic mechanism, through which two
communication parties could authenticate each other in the open network environment. To …

A comprehensive survey of fingerprint presentation attack detection

K Karampidis, M Rousouliotis, E Linardos… - 2021 - repository-empedu-rd.ekt.gr
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …

An efficient biometrics-based remote user authentication scheme using smart cards

CT Li, MS Hwang - Journal of Network and computer applications, 2010 - Elsevier
In this paper, we propose an efficient biometric-based remote user authentication scheme
using smart cards, in which the computation cost is relatively low compared with other …

A privacy preserving three-factor authentication protocol for e-health clouds

Q Jiang, MK Khan, X Lu, J Ma, D He - The Journal of Supercomputing, 2016 - Springer
E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of
big data in healthcare. However, such an adoption also brings about a series of challenges …

A lightweight biometrics based remote user authentication scheme for IoT services

PK Dhillon, S Kalra - Journal of Information Security and Applications, 2017 - Elsevier
User authentication is becoming crucial in the accelerating Internet of Things (IoT)
environment. With IoT several applications and services have been emerging in the areas …

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

MC Chuang, MC Chen - Expert Systems with Applications, 2014 - Elsevier
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …

A generic framework for three-factor authentication: Preserving security and privacy in distributed systems

X Huang, Y Xiang, A Chonka, J Zhou… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

AK Das - IET Information Security, 2011 - IET
The author first reviews the recently proposed Li-Hwang's biometric-based remote user
authentication scheme using smart cards; then shows that the Li-Hwang's scheme has some …

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

X Li, JW Niu, J Ma, WD Wang, CL Liu - Journal of network and computer …, 2011 - Elsevier
Recently, Li and Hwang proposed a biometrics-based remote user authentication scheme
using smart cards [Journal of Network and Computer Applications 33 (2010) 1–5]. The …