Mitigating the desynchronisation attack in multiserver environment

SU Jan, F Qayum - IET Communications, 2020 - Wiley Online Library
Currently, every user outsources a huge amount of shared secrets remotely from different
servers and utilises synchrony resources. To make all types of operations secure for the end …

An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards

J Moon, Y Choi, J Jung, D Won - PloS one, 2015 - journals.plos.org
In multi-server environments, user authentication is a very important issue because it
provides the authorization that enables users to access their data and services; furthermore …

[HTML][HTML] A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

KS Roy, S Deb, HK Kalita - Digital Communications and Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) has taken the interconnected world by storm. Due to
their immense applicability, IoT devices are being scaled at exponential proportions …

An efficient user authentication and session key agreement in wireless sensor network using smart card

C Chunka, S Banerjee, RS Goswami - Wireless Personal Communications, 2021 - Springer
Securely accessing the information from sensor nodes is the premier need and becomes the
challenging area in wireless sensor networks (WSNs) and internet of things environment …

A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity

H Xiong, Z Kang, J Chen, J Tao, C Yuan… - IEEE Systems …, 2020 - ieeexplore.ieee.org
As the indispensable part of the security demand in a distributed system, a variety of online
services need to be protected from unauthorized access. Multiserver authentication (MA) is …

Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks

W Li, B Li, Y Zhao, P Wang, F Wei - … and Mobile Computing, 2018 - Wiley Online Library
Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial
world and academic community. To facilitate real‐time data access for external users from …

A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS

AK Das, V Odelu, A Goswami - Journal of medical systems, 2015 - Springer
The telecare medicine information system (TMIS) helps the patients to gain the health
monitoring facility at home and access medical services over the Internet of mobile networks …

An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography

AG Reddy, AK Das, V Odelu, KY Yoo - PloS one, 2016 - journals.plos.org
Biometric based authentication protocols for multi-server architectures have gained
momentum in recent times due to advancements in wireless technologies and associated …

ECC-based lightweight authentication and access control scheme for IoT E-healthcare

H Yao, Q Yan, X Fu, Z Zhang, C Lan - Soft Computing, 2022 - Springer
The E-healthcare system has a complex architecture, diverse business types, and sensitive
data security. To meet the secure communication and access control requirements in the …

An enhanced multi‐server authentication protocol using password and smart‐card: cryptanalysis and design

T Maitra, SKH Islam, R Amin, D Giri… - Security and …, 2016 - Wiley Online Library
At the present time, application of online communication systems are rapidly increasing and
most of the clients depend on a set of servers to fulfill their daily needs. In order to access …