A novel three-factor authentication scheme with high security for multi-server environments

R Chen, Y Mou, M Zhang - Wireless Personal Communications, 2022 - Springer
In a multi-sever scenario, a two-party remote user authentication scheme is faced with
various kinds of security threats. The introduction of biometric technology can effectively …

ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications

T Maitra, MS Obaidat, D Giri, S Dutta, K Dahal - IET Networks, 2019 - Wiley Online Library
Life in modern society becomes easier due to the rapid growth of different technologies like
real‐time analytic, ubiquitous wireless communication, commodity sensors, machine …

[PDF][PDF] An improved biometric-based multi-server authentication scheme using smart card

KC Baruah, S Banerjee, MP Dutta… - international journal of …, 2015 - academia.edu
To protect the resources from unauthorized users, the remote user authentication have
become an essential part in the communication network. Currently, smart card-based remote …

Next-generation user authentication schemes for iot applications

S Gupta - 2020 - iris.unitn.it
The unprecedented rise of IoT has revolutionized every business vertical enthralling people
to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is …

A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

S Shukla, SJ Patel - Cluster Computing, 2024 - Springer
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …

[图书][B] Smart Card Security: Applications, Attacks, and Countermeasures

BB Gupta, M Quamara - 2019 - taylorfrancis.com
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of
smart card technology and explores different security attacks and countermeasures …

Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments

L Yang, Z Zheng - Plos One, 2018 - journals.plos.org
According to advancements in the wireless technologies, study of biometrics-based multi-
server authenticated key agreement schemes has acquired a lot of momentum. Recently …

Secure user authentication scheme with novel server mutual verification for multiserver environments

YH Park, KS Park, YH Park - International Journal of …, 2019 - Wiley Online Library
The fast growth of mobile services and devices has made the conventional single‐server
architecture ineffective from the point of its functional requirements. To extend the scalability …

A biometric based remote user authentication technique using smart card in multi-server environment

S Kandar, S Pal, BC Dhara - Wireless Personal Communications, 2021 - Springer
Remote user authentication is an efficient technique to perform secure communication over
an insecure network. In this current research article, a lightweight remote user authentication …

An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment

C Wang, K Ding, B Li, Y Zhao, G Xu… - Wireless …, 2018 - Wiley Online Library
With the popularity of cloud computing, information security issues in the cloud environment
are becoming more and more prominent. As the first line of defense to ensure cloud …