Dynamic ID-based remote user password authentication schemes using smart cards: A review

R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification

AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

D Wang, N Wang, P Wang, S Qing - Information Sciences, 2015 - Elsevier
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …

Security flaws in two improved remote user authentication schemes using smart cards

CG Ma, D Wang, SD Zhao - International Journal of …, 2014 - Wiley Online Library
Understanding security failures of cryptographic protocols is the key to both patching
existing protocols and designing future schemes. In this paper, we analyze two recent …

Chaotic maps-based password-authenticated key agreement using smart cards

C Guo, CC Chang - Communications in Nonlinear Science and Numerical …, 2013 - Elsevier
Password-based authenticated key agreement using smart cards has been widely and
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …

The request for better measurement: A comparative evaluation of two-factor authentication schemes

D Wang, Q Gu, H Cheng, P Wang - Proceedings of the 11th ACM on …, 2016 - dl.acm.org
Despite over two decades of continuous efforts, how to design a secure and efficient two-
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …

Design of secure authenticated key management protocol for cloud computing environments

W Li, X Li, J Gao, H Wang - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
With the maturity of cloud computing technology in terms of reliability and efficiency, a large
number of services have migrated to the cloud platform. To convenient access to the …

A secure remote user mutual authentication scheme using smart cards

M Karuppiah, R Saravanan - Journal of information security and …, 2014 - Elsevier
Authentication thwarts unauthorised users from accessing resources in insecure network
environments. Password authentication based on smart cards is one of the simplest and …

Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update

X Li, J Niu, J Liao, W Liang - International Journal of …, 2015 - Wiley Online Library
In the authentication scheme, it is important to ensure that the user's identity changed
dynamically with the different sessions, which can protect the user's privacy information from …