Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC

M Qi, J Chen - Multimedia Tools and Applications, 2019 - Springer
The rapidly evolving communication technology has now made it easy for people to enjoy
kinds of online services over the insecure public internet. However, with convenience …

A survey of authenticated key agreement protocols for multi-server architecture

I ul Haq, J Wang, Y Zhu, S Maqbool - Journal of Information Security and …, 2020 - Elsevier
This paper presents a comprehensive survey of authenticated key agreement protocols,
which have been proposed for multi-server architectures. The growing use of cloud-based …

An untraceable biometric-based multi-server authenticated key agreement protocol with revocation

CC Chang, NT Nguyen - Wireless Personal Communications, 2016 - Springer
Online access has been widely adopted to distribute diversified services to customers. In this
architecture, public channels are utilized to exchange information between end users and …

A secure and efficient identity‐based mutual authentication scheme with smart card using elliptic curve cryptography

M Luo, Y Zhang, MK Khan, D He - International Journal of …, 2017 - Wiley Online Library
The e‐commerce has got great development in the past decades and brings great
convenience to people. Users can obtain all kinds of services through e‐commerce platform …

Use intention of mobile fingerprint payment between UTAUT and DOI in China

R Wu - 유통과학연구, 2017 - dbpia.co.kr
Purpose–With the rapid growth of Chinese mobile pay market, it's necessary to run a study
of the aims why users prefer to intention of use for mobile fingerprint payment. To reach this …

An independent three‐factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey

YH Chuang, CL Lei - International Journal of Communication …, 2021 - Wiley Online Library
In the past decades, the demand for remote mutual authentication and key agreement
(MAKA) scheme with privacy preserving grows rapidly with the rise of the right to privacy and …

A blockchain-assisted lightweight anonymous authentication scheme for medical services in internet of medical things

S Wu, A Zhang, J Chen, G Peng, Y Gao - Wireless Personal …, 2023 - Springer
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet
for registered patients anywhere, bringing convenience to people's everyday life …

A robust authentication scheme for client-server architecture with provable security analysis

SU Jan, F Qayum - Network and Communication Technologies, 2018 - papers.ssrn.com
Client-server computing is the analytical development of compatible programming with
significant supposition and the detachment of a massive program into its fundamental parts …

Efficient and secure time-key based single sign-on authentication for mobile devices

V Odelu, AK Das, KKR Choo, N Kumar, Y Park - IEEE Access, 2017 - ieeexplore.ieee.org
In recent years, mobile devices are becoming an integrated part of our society, and this
reinforces the need for security and privacy without incurring additional communication and …

Hash based multi-server key exchange protocol using smart card

PC Gupta, J Dhar - Wireless Personal Communications, 2016 - Springer
With the aim to use numerous network based services through one time user/client
registration, lots of works have been done. Most of the work uses password based login …