Dynamic ID-based remote user password authentication schemes using smart cards: A review
R Madhusudhan, RC Mittal - Journal of Network and Computer …, 2012 - Elsevier
Remote user authentication is a mechanism, in which the remote server verifies the
legitimacy of a user over an insecure communication channel. Until now, there have been …
legitimacy of a user over an insecure communication channel. Until now, there have been …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
AV Soreng, S Kandar - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Image transmission is gaining importance with the advancement of information
communication technology. Transmission of sensitive images in diverse applications like …
communication technology. Transmission of sensitive images in diverse applications like …
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …
interest in the past two decades. While security-related issues have been well studied, how …
Security flaws in two improved remote user authentication schemes using smart cards
Understanding security failures of cryptographic protocols is the key to both patching
existing protocols and designing future schemes. In this paper, we analyze two recent …
existing protocols and designing future schemes. In this paper, we analyze two recent …
Chaotic maps-based password-authenticated key agreement using smart cards
Password-based authenticated key agreement using smart cards has been widely and
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …
intensively researched. Inspired by the semi-group property of Chebyshev maps and key …
The request for better measurement: A comparative evaluation of two-factor authentication schemes
Despite over two decades of continuous efforts, how to design a secure and efficient two-
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …
Design of secure authenticated key management protocol for cloud computing environments
W Li, X Li, J Gao, H Wang - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
With the maturity of cloud computing technology in terms of reliability and efficiency, a large
number of services have migrated to the cloud platform. To convenient access to the …
number of services have migrated to the cloud platform. To convenient access to the …
A secure remote user mutual authentication scheme using smart cards
M Karuppiah, R Saravanan - Journal of information security and …, 2014 - Elsevier
Authentication thwarts unauthorised users from accessing resources in insecure network
environments. Password authentication based on smart cards is one of the simplest and …
environments. Password authentication based on smart cards is one of the simplest and …
Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
In the authentication scheme, it is important to ensure that the user's identity changed
dynamically with the different sessions, which can protect the user's privacy information from …
dynamically with the different sessions, which can protect the user's privacy information from …