Provably Secure Client‐Server Key Management Scheme in 5G Networks

L Yang, YC Chen, TY Wu - Wireless Communications and …, 2021 - Wiley Online Library
The increasing demand for real‐time data transmission in wireless mobile communication
networks has promoted the maturity of mobile communication technology. Fifth‐generation …

Provably secure multi-server authentication protocol using fuzzy commitment

S Barman, AK Das, D Samanta, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
Remote user authentication is a cryptographic mechanism through which a remote server
verifies the legitimacy of an authorized user over an insecure communication channel. Most …

Identity privacy preserving biometric based authentication scheme for naked healthcare environment

T Kumar, A Braeken, M Liyanage… - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
Recent developments in Internet of Things (IoT) technologies have already put a huge
impact on the medical and health sector. Thus, the patient treatment can be performed in …

An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics

H Lin, F Wen, C Du - Wireless Personal Communications, 2015 - Springer
Recently, Chuang et al. proposed a multi-server authenticated key agreement scheme
based on trust computing using smart cards and biometrics. They claimed that their scheme …

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments

K Mahmood, W Akram, A Shafiq, I Altaf… - Computers & Electrical …, 2020 - Elsevier
Abstract The Internet-of-Multimedia-Things (IoMT) opens new doors towards various
contingencies to improve applications and services through efficient multimedia data usage …

AGE: Authentication in gadget-free healthcare environments

T Kumar, A Braeken, AD Jurcut, M Liyanage… - Information Technology …, 2020 - Springer
Mobile and sensor related technologies are significantly revolutionizing the medical and
healthcare sectors. In current healthcare systems, gadgets are the prominent way of …

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

H Huang, S Lu, Z Wu, Q Wei - EURASIP Journal on Wireless …, 2021 - Springer
With the widespread use of Internet of Things and cloud computing in smart cities, various
security and privacy challenges may be encountered. The most basic problem is …

An improved and robust biometrics-based three factor authentication scheme for multiserver environments

SA Chaudhry, H Naqvi, MS Farash, T Shon… - The Journal of …, 2018 - Springer
The rapid advancement in communication technologies enables remote users to acquire a
number of online services. All such online services are provided remotely facilitating the …

A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

F Wang, G Xu, G Xu, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
With the development of Internet of Things (IoT) technologies, Internet‐enabled devices
have been widely used in our daily lives. As a new service paradigm, cloud computing aims …

A secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments

J Zhao, W Bian, D Xu, B Jie, X Ding, W Zhou… - Ieee …, 2020 - ieeexplore.ieee.org
The emergence of multi-server authentication key protocol schemes provides a viable
environment for users to easily access the services of multiple legitimate servers through a …