Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit

M Gupta, NS Chaudhari - Ad Hoc Networks, 2019 - Elsevier
… Many privacy-preserving two-factor authentication protocols … We propose a privacy-preserving
secure two-factor authentication … description of the proposed scheme is given in Section 5. …

An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
… Although cloud computing is at its inception, there are some serious concerns … verification
tools for security protocols targets to evaluate the heftiness of these in the presence of some

Anonymous three-factor authenticated key agreement for wireless sensor networks

Y Lu, G Xu, L Li, Y Yang - Wireless Networks, 2019 - Springer
… attracting many researchers’ attention, several two-factor authentication scheme with …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

[PDF][PDF] Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks

S Qiu, D Wang - Journal of Surveillance, Security and Safety, 2021 - f.oaes.cc
purpose of achieving perfect forward security, the two-factor … protocols in GLOMONET
environment, highlights some … with security beyond traditional limit. Ad Hoc Netw 2019;84:5667. …

A lightweight two-factor authentication scheme for mobile cloud computing

A Abuarqoub - … on Future Networks and Distributed Systems, 2019 - dl.acm.org
authentication scheme aims at increasing authentication … registration, login, and verification
(authentication), as well as some … Upon accomplishment of the registration phase, the user is …

An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography

S Qiu, G Xu, H Ahmad, G Xu, X Qiu… - … and Information Systems  …, 2019 - koreascience.kr
Some notations used in this paper are listed in Table 1. … the idealized form, security goals
and initiative premises of the … Wang, “On the anonymity of two-factor authentication schemes for …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - … and Secure Computing, 2021 - ieeexplore.ieee.org
… found unable to attain truly two-factor security shortly after they … (eg, user anonymity [36]
and repairability) beyond that of … password authentication scheme, we need to store some

Understanding security failures of anonymous authentication schemes for cloud environments

M Xu, D Wang, Q Wang, Q Jia - Journal of Systems Architecture, 2021 - Elsevier
… -preserving authentication scheme is drawing some lessons … For nearly a decade, the history
of the two-factor authentication … our supposed C-02 and the security goal of user anonymity. …

A Forward-secure Efficient Two-factor Authentication Protocol

SJ Murdoch, A Abadi - arXiv preprint arXiv:2208.02877, 2022 - arxiv.org
… To attain its goals, our protocol does not use any trusted … two endpoints may get out of
synchronisation after a certain time. … two-factor authentication scheme for preserving anonymity in …

A Secure Two-factor Authentication Key Exchange Scheme

Y Han, C Xu, C Jiang, K Chen - … and Secure Computing, 2024 - ieeexplore.ieee.org
… Finally, we demonstrate that TAKE achieves the security goals … For each game, we define
some events as follows. … Park, “Authenticated key agreement scheme with user anonymity and …