Chuang et al., 2020 - Google Patents
Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelinesChuang et al., 2020
- Document ID
- 11889514576939282029
- Author
- Chuang Y
- Lei C
- Shiu H
- Publication year
- Publication venue
- 2020 15th Asia Joint Conference on Information Security (AsiaJCIS)
External Links
Snippet
With the growing demand of user privacy preserving, there is an urgent requirement for designing a secure remote user authentication and key agreement (AKA) scheme with user privacy preserving. We survey and discuss present three-factor based remote user AKA …
- 230000003211 malignant 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model | |
Hsiang et al. | Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment | |
US8352739B2 (en) | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same | |
Chen et al. | Security enhancement on an improvement on two remote user authentication schemes using smart cards | |
EP2416524B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
Chen et al. | Towards secure and efficient user authentication scheme using smart card for multi-server environments | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
Jain et al. | A Comparison based approach on mutual authentication and key agreement using DNA cryptography | |
Das et al. | A biometric-based user authentication scheme for heterogeneous wireless sensor networks | |
Cheikhrouhou et al. | A lightweight user authentication scheme for wireless sensor networks | |
Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
Wang et al. | User authentication scheme with privacy-preservation for multi-server environment | |
Chuang et al. | An independent three‐factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey | |
Yang et al. | A trust and privacy preserving handover authentication protocol for wireless networks | |
Chuang et al. | Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines | |
İşler et al. | Distributed single password protocol framework | |
Lee et al. | Improvement of the EIGamal based remote authentication scheme using smart cards | |
Chatterjee et al. | A novel multi-server authentication scheme for e-commerce applications using smart card | |
Zhu | Cryptanalysis and improvement of a mobile dynamic ID authenticated key agreement scheme based on chaotic maps | |
Yu et al. | Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones | |
Quan et al. | Cryptanalysis of a chaotic chebyshev polynomials based remote user authentication scheme | |
Ahmed et al. | Mutual authentication for mobile cloud computing: Review and suggestion | |
Horng et al. | A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards | |
Lin et al. | Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting. | |
Kim et al. | Weaknesses and improvements of a one-time password authentication scheme |