Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks

F Wu, L Xu, S Kumari, X Li - Computers & Electrical Engineering, 2015 - Elsevier
The biometrics, the password and the storage device are the elements of the three-factor
authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme …

Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme

W Bian, P Gope, Y Cheng, Q Li - Future Generation Computer Systems, 2020 - Elsevier
The fingerprint has long been used as one of the most important biological features in the
field of biometrics. It is person-specific and remain identical though out one's lifetime …

Cryptanalysis and improvement of 'a robust smart‐card‐based remote user password authentication scheme'

S Kumari, MK Khan - International Journal of Communication …, 2014 - Wiley Online Library
With the use of smart card in user authentication mechanisms, the concept of two‐factor
authentication came into existence. This was a forward move towards more secure and …

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments

K Mahmood, W Akram, A Shafiq, I Altaf… - Computers & Electrical …, 2020 - Elsevier
Abstract The Internet-of-Multimedia-Things (IoMT) opens new doors towards various
contingencies to improve applications and services through efficient multimedia data usage …

A secure three-factor-based authentication with key agreement protocol for e-Health clouds

Y Chen, J Chen - The Journal of Supercomputing, 2021 - Springer
The rapid development of electronic healthcare (e-Health) has brought great convenience to
people's life. In order to guarantee the security of users, a large number of identity …

More secure smart card‐based remote user password authentication scheme with user anonymity

S Kumari, MK Khan - Security and Communication Networks, 2014 - Wiley Online Library
In 2009, Xu et al. designed a smart card‐based user authentication scheme. It was found at
risk of offline password guessing and forgery attacks as proved by Sood et al. They also …

More efficient key-hash based fingerprint remote authentication scheme using mobile device

MK Khan, S Kumari, MK Gupta - Computing, 2014 - Springer
Today, the world is taking large leaps of progress in technology. The technology is turning
the vision of achieving transparency, speed, accuracy, authenticity, friendliness and security …

Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments

M Mohammedi, M Omar, A Bouabdallah - Journal of Ambient Intelligence …, 2018 - Springer
Biometrics is an emerging technology for patient authentication due to its advantages over
the other methods, as passwords and smart cards. However, in mobile environments, it …

An efficient, robust, and lightweight subtree-based three-factor authentication procedure for large-scale DWSN in random oracle

C Meshram, MS Obaidat, CC Lee… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring
systems that are applied to serve many different parts of our everyday lives including traffic …