… Although cloud computing is at its inception, there are some serious concerns … verification tools for security protocols targets to evaluate the heftiness of these in the presence of some …
Y Lu, G Xu, L Li, Y Yang - Wireless Networks, 2019 - Springer
… attracting many researchers’ attention, several two-factorauthentication scheme with … Anonymoustwo-factorauthentication in distributedsystems: Certaingoals are beyondattainment…
S Qiu, D Wang - Journal of Surveillance, Security and Safety, 2021 - f.oaes.cc
… purpose of achieving perfect forward security, the two-factor … protocols in GLOMONET environment, highlights some … with security beyond traditional limit. Ad Hoc Netw 2019;84:5667. …
A Abuarqoub - … on Future Networks and Distributed Systems, 2019 - dl.acm.org
… authentication scheme aims at increasing authentication … registration, login, and verification (authentication), as well as some … Upon accomplishment of the registration phase, the user is …
S Qiu, G Xu, H Ahmad, G Xu, X Qiu… - … and Information Systems …, 2019 - koreascience.kr
… Some notations used in this paper are listed in Table 1. … the idealized form, security goals and initiative premises of the … Wang, “On the anonymity of two-factorauthentication schemes for …
Q Wang, D Wang, C Cheng… - … and Secure Computing, 2021 - ieeexplore.ieee.org
… found unable to attain truly two-factor security shortly after they … (eg, user anonymity [36] and repairability) beyond that of … password authentication scheme, we need to store some …
M Xu, D Wang, Q Wang, Q Jia - Journal of Systems Architecture, 2021 - Elsevier
… -preserving authentication scheme is drawing some lessons … For nearly a decade, the history of the two-factorauthentication … our supposed C-02 and the security goal of user anonymity. …
… To attain its goals, our protocol does not use any trusted … two endpoints may get outof synchronisation after a certain time. … two-factorauthentication scheme for preserving anonymity in …
Y Han, C Xu, C Jiang, K Chen - … and Secure Computing, 2024 - ieeexplore.ieee.org
… Finally, we demonstrate that TAKE achieves the security goals … For each game, we define some events as follows. … Park, “Authenticated key agreement scheme with user anonymity and …