Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
Robust biometrics-based authentication scheme for multiserver environment
The authentication scheme is an important cryptographic mechanism, through which two
communication parties could authenticate each other in the open network environment. To …
communication parties could authenticate each other in the open network environment. To …
A comprehensive survey of fingerprint presentation attack detection
K Karampidis, M Rousouliotis, E Linardos… - 2021 - repository-empedu-rd.ekt.gr
Nowadays, the number of people that utilize either digital applications or machines is
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …
increasing exponentially. Therefore, trustworthy verification schemes are required to ensure …
An efficient biometrics-based remote user authentication scheme using smart cards
In this paper, we propose an efficient biometric-based remote user authentication scheme
using smart cards, in which the computation cost is relatively low compared with other …
using smart cards, in which the computation cost is relatively low compared with other …
A privacy preserving three-factor authentication protocol for e-health clouds
E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of
big data in healthcare. However, such an adoption also brings about a series of challenges …
big data in healthcare. However, such an adoption also brings about a series of challenges …
A lightweight biometrics based remote user authentication scheme for IoT services
PK Dhillon, S Kalra - Journal of Information Security and Applications, 2017 - Elsevier
User authentication is becoming crucial in the accelerating Internet of Things (IoT)
environment. With IoT several applications and services have been emerging in the areas …
environment. With IoT several applications and services have been emerging in the areas …
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …
research increasingly combining a user's biometrics with a password to design a remote …
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …
protection from unauthorized use. Remote authentication is the most commonly used …
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
AK Das - IET Information Security, 2011 - IET
The author first reviews the recently proposed Li-Hwang's biometric-based remote user
authentication scheme using smart cards; then shows that the Li-Hwang's scheme has some …
authentication scheme using smart cards; then shows that the Li-Hwang's scheme has some …
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Recently, Li and Hwang proposed a biometrics-based remote user authentication scheme
using smart cards [Journal of Network and Computer Applications 33 (2010) 1–5]. The …
using smart cards [Journal of Network and Computer Applications 33 (2010) 1–5]. The …