An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography

S Qiu, G Xu, H Ahmad, G Xu, X Qiu… - KSII Transactions on …, 2019 - koreascience.kr
With the rapid development of the Internet of Things, the problem of privacy protection has
been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s …

A secure and improved multi server authentication protocol using fuzzy commitment

HU Rehman, A Ghani, SA Chaudhry… - Multimedia Tools and …, 2021 - Springer
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the …

An improved method for digital image fragile watermarking based on chaotic maps

M Nazari, A Sharif, M Mollaeefar - Multimedia Tools and Applications, 2017 - Springer
In this paper, the digital image fragile watermarking method based on chaotic maps is
proposed. Our method has some significant advantageous in comparison with other …

Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography

MS Farash, S Kumari, M Bakhtiari - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) has been receiving a lot of attention to provide security
in the Voice over IP (VoIP) in Internet and mobility management. Recently, Yeh et al …

Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks

O Mir, J Munilla, S Kumari - Peer-to-Peer Networking and Applications, 2017 - Springer
The use of wireless medical sensor networks (WMSN) in healthcare has led to a significant
progress in this area. WMSN can sense patients' vital signs and transmit sensed signals to …

Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP

M Nikooghadam, H Amintoosi - The Journal of supercomputing, 2020 - Springer
With the advent of the internet, Voice over Internet Protocol (VoIP) has obtained a
considerable amount of attention due to its low cost, and ease of implementation. Similar to …

An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards

V Odelu, AK Das, A Goswami - Security and Communication …, 2015 - Wiley Online Library
In communication systems, authentication protocols play an important role in protecting
sensitive information against a malicious adversary by means of providing a variety of …

Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems

H Arshad, A Rasoolzadegan - Journal of medical systems, 2016 - Springer
Authentication and key agreement schemes play a very important role in enhancing the
level of security of telecare medicine information systems (TMISs). Recently, Amin and …

A robust mutual authentication with a key agreement scheme for session initiation protocol

CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu - Applied Sciences, 2018 - mdpi.com
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A decentralized lightweight authentication protocol under blockchain

M Xu, G Xu, H Xu, J Zhou, S Li - Concurrency and Computation …, 2022 - Wiley Online Library
With the continuous development of blockchain technology, blockchain gradually becomes
to play an important role in the fields of finance, medicine, and new energy. In the …