[HTML][HTML] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

J Wang, Y Zhu, S Maqbool - Digital Communications and Networks, 2021 - Elsevier
During the past decade, rapid advances in wireless communication technologies have
made it possible for users to access desired services using hand-held devices. Service …

REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs

M Al-Zubaidie, Z Zhang, J Zhang - Applied Sciences, 2020 - mdpi.com
Healthcare institutions require advanced technology to collect patients' data accurately and
continuously. The tradition technologies still suffer from two problems: performance and …

Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

B Yu, H Li - International Journal of Distributed Sensor …, 2019 - journals.sagepub.com
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things,
interconnects a variety of intelligent sensor devices and appliances to provide intelligent …

An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre

A Irshad, M Sher, SA Chaudhary, H Naqvi… - The Journal of …, 2016 - Springer
Multi-server authentication (MSA) enables the user to avail multiple services permitted from
various servers out of a single registration through registration centre. Earlier, through single …

A biometrics and smart cards‐based authentication scheme for multi‐server environments

Y Lu, L Li, H Peng, Y Yang - Security and Communication …, 2015 - Wiley Online Library
With the rapid development of computer networks, multi‐server architecture has attracted
much attention in many network environments. Moreover, in order to achieve non …

A secure biometric based multi-server authentication scheme for social multimedia networks

SA Chaudhry - Multimedia Tools and Applications, 2016 - Springer
Social networking is one of the major source of massive data. Such data is not only difficult
to store, manipulate and maintain but it's open access makes it security prone. Therefore …

Provably secure anonymous three-factor authentication scheme for multi-server environments

D Xu, J Chen, Q Liu - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
Significant developments in wireless communication technologies have resulted in the
increased popularity of mobile devices and mobile services. However, excessive service …

A lightweight block cipher technique for IoT based E-healthcare system security

K Chatterjee, RRK Chaudhary, A Singh - Multimedia Tools and …, 2022 - Springer
All the real and virtual IoT devices are connected to provide intelligent and decision-making
services. Each IoT based application is designed for some specific purpose and function …

An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system

Y Chen, J Chen - Peer-to-Peer Networking and Applications, 2022 - Springer
Telecare medicine information system (TMIS) is developing rapidly and widely used with the
support of computer, communication and other advanced technologies. It can ensure the …

A provably secure biometrics‐based authentication scheme for multiserver environment

F Wang, G Xu, C Wang, J Peng - Security and Communication …, 2019 - Wiley Online Library
With the rapid development of mobile services, multiserver authentication protocol with its
high efficiency has emerged as an indispensable security mechanism for mobile services …