Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs

D Wang, P Wang, C Wang - ACM Transactions on Cyber-Physical …, 2020 - dl.acm.org
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …

Revisiting Anonymous Two‐Factor Authentication Schemes for IoT‐Enabled Devices in Cloud Computing Environments

P Wang, B Li, H Shi, Y Shen… - Security and …, 2019 - Wiley Online Library
Investigating the security pitfalls of cryptographic protocols is crucial to understand how to
improve security. At ICCCS'17, Wu and Xu proposed an efficient smart‐card‐based …

An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks

C Wang, G Xu, J Sun - Sensors, 2017 - mdpi.com
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have
touched every aspect of our lives, such as health monitoring, environmental monitoring and …

A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment

C Wang, G Xu, W Li - Security and Communication Networks, 2018 - Wiley Online Library
With the great development of network technology, the multiserver system gets widely used
in providing various of services. And the two‐factor authentication protocols in multiserver …

An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment

C Wang, K Ding, B Li, Y Zhao, G Xu… - Wireless …, 2018 - Wiley Online Library
With the popularity of cloud computing, information security issues in the cloud environment
are becoming more and more prominent. As the first line of defense to ensure cloud …

An improved user authentication and key agreement scheme for roaming service in ubiquitous network

S Khatoon, TY Chen, CC Lee - Annals of Telecommunications, 2022 - Springer
Up till now, numerous authentication and key agreement schemes have been proposed for
ubiquitous networks. Recently, Arshad and Rasoolzadegan also proposed an authentication …

A robust and effective 3-factor authentication protocol for smart factory in IIoT

S Zou, Q Cao, R Lu, C Wang, G Xu, H Ma… - Computer …, 2024 - Elsevier
Smart factory, as an intelligent application of industrial internet of things (IIoT), significantly
enhances the efficiency of industrial processes while also reducing resource waste. In a …

[PDF][PDF] Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks

S Qiu, D Wang - Journal of Surveillance, Security and Safety, 2021 - f.oaes.cc
Designing a secure and efficient anonymous authentication protocol for roaming services in
global mobile networks is a hot topic in the field of information security protocols. Based on …

[PDF][PDF] 对三个多服务器环境下匿名认证协议的分析

汪定, 李文婷, 王平 - 软件学报, 2017 - jos.org.cn
设计安全, 高效的多服务器环境下匿名身份认证协议是当前安全协议领域的研究热点.
基于广泛接受的攻击者模型, 对多服务器环境下的3 个代表性匿名认证协议进行了安全性分析 …

A composable multifactor identity authentication and authorization scheme for 5G services

Y Luo, H Li, R Ma, Z Guo - Security and Communication …, 2021 - Wiley Online Library
The fifth‐generation (5G) mobile communication technology has already deployed
commercially and become a global research focus. The new features of 5G include …