[go: up one dir, main page]

Chuang et al., 2020 - Google Patents

Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines

Chuang et al., 2020

Document ID
11889514576939282029
Author
Chuang Y
Lei C
Shiu H
Publication year
Publication venue
2020 15th Asia Joint Conference on Information Security (AsiaJCIS)

External Links

Snippet

With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Xie et al. Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Hsiang et al. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
US8352739B2 (en) Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
Chen et al. Security enhancement on an improvement on two remote user authentication schemes using smart cards
EP2416524B1 (en) System and method for secure transaction of data between wireless communication device and server
Chen et al. Towards secure and efficient user authentication scheme using smart card for multi-server environments
CN110020524A (en) A kind of mutual authentication method based on smart card
Jain et al. A Comparison based approach on mutual authentication and key agreement using DNA cryptography
Das et al. A biometric-based user authentication scheme for heterogeneous wireless sensor networks
Cheikhrouhou et al. A lightweight user authentication scheme for wireless sensor networks
Niu et al. A novel user authentication scheme with anonymity for wireless communications
Wang et al. User authentication scheme with privacy-preservation for multi-server environment
Chuang et al. An independent three‐factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
Yang et al. A trust and privacy preserving handover authentication protocol for wireless networks
Chuang et al. Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines
İşler et al. Distributed single password protocol framework
Lee et al. Improvement of the EIGamal based remote authentication scheme using smart cards
Chatterjee et al. A novel multi-server authentication scheme for e-commerce applications using smart card
Zhu Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps
Yu et al. Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones
Quan et al. Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme
Ahmed et al. Mutual authentication for mobile cloud computing: Review and suggestion
Horng et al. A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
Lin et al. Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting.
Kim et al. Weaknesses and improvements of a one-time password authentication scheme