Authentication in mobile cloud computing: A survey
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …
that incorporates multitude of heterogeneous cloud-based resources to augment …
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks
The biometrics, the password and the storage device are the elements of the three-factor
authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme …
authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme …
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme
The fingerprint has long been used as one of the most important biological features in the
field of biometrics. It is person-specific and remain identical though out one's lifetime …
field of biometrics. It is person-specific and remain identical though out one's lifetime …
Cryptanalysis and improvement of 'a robust smart‐card‐based remote user password authentication scheme'
With the use of smart card in user authentication mechanisms, the concept of two‐factor
authentication came into existence. This was a forward move towards more secure and …
authentication came into existence. This was a forward move towards more secure and …
An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments
Abstract The Internet-of-Multimedia-Things (IoMT) opens new doors towards various
contingencies to improve applications and services through efficient multimedia data usage …
contingencies to improve applications and services through efficient multimedia data usage …
A secure three-factor-based authentication with key agreement protocol for e-Health clouds
Y Chen, J Chen - The Journal of Supercomputing, 2021 - Springer
The rapid development of electronic healthcare (e-Health) has brought great convenience to
people's life. In order to guarantee the security of users, a large number of identity …
people's life. In order to guarantee the security of users, a large number of identity …
More secure smart card‐based remote user password authentication scheme with user anonymity
In 2009, Xu et al. designed a smart card‐based user authentication scheme. It was found at
risk of offline password guessing and forgery attacks as proved by Sood et al. They also …
risk of offline password guessing and forgery attacks as proved by Sood et al. They also …
More efficient key-hash based fingerprint remote authentication scheme using mobile device
Today, the world is taking large leaps of progress in technology. The technology is turning
the vision of achieving transparency, speed, accuracy, authenticity, friendliness and security …
the vision of achieving transparency, speed, accuracy, authenticity, friendliness and security …
Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments
M Mohammedi, M Omar, A Bouabdallah - Journal of Ambient Intelligence …, 2018 - Springer
Biometrics is an emerging technology for patient authentication due to its advantages over
the other methods, as passwords and smart cards. However, in mobile environments, it …
the other methods, as passwords and smart cards. However, in mobile environments, it …
An efficient, robust, and lightweight subtree-based three-factor authentication procedure for large-scale DWSN in random oracle
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring
systems that are applied to serve many different parts of our everyday lives including traffic …
systems that are applied to serve many different parts of our everyday lives including traffic …