Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain

D Kang, J Jung, J Mun, D Lee, Y Choi… - Security and …, 2016 - Wiley Online Library
Because of the evolution of mobile devices and networks, users can now access a network
at any moment, in whatever place with a smart card. User authentication using smart card is …

An efficient user authentication scheme with smart cards for wireless communications

W Jeon, Y Lee, D Won - International Journal of Security and Its …, 2013 - earticle.net
Since 2004, several user authentication schemes purpose to provide user anonymity in
wireless communication have been announced, however, many of them failed to provide …

Practical anonymous user authentication scheme with security proof

HY Chien - Computers & Security, 2008 - Elsevier
An authenticated key distribution scheme preserving user anonymity is important to those e-
commerce applications where user anonymity is required or desirable. However, the …

Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS

M Wazid, AK Das, S Kumari, X Li… - Security and …, 2016 - Wiley Online Library
Several remote user authentication techniques for telecare medicine information system
(TMIS) have been proposed in the literature. But most existing techniques have limitations …

SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments

NMR Lwamo, L Zhu, C Xu, K Sharif, X Liu, C Zhang - Information Sciences, 2019 - Elsevier
The rapid increase in user base and technological penetration has enabled the use of a
wide range of devices and applications. The services are rendered to these devices from …

Security analysis of authentication scheme for wireless communications with user anonymity

W Jeon, J Kim, Y Lee, D Won - … , Secure and Trust Computing, and Data …, 2012 - Springer
Recently, with the growth of the smartphone, wireless communi-cations using mobile device
are growing rapidly around the world. The most advantage of the wireless communication is …

A strong user authentication scheme with smart cards for wireless communications

D He, M Ma, Y Zhang, C Chen, J Bu - Computer Communications, 2011 - Elsevier
Seamless roaming over wireless network is highly desirable to mobile users, and security
such as authentication of mobile users is challenging. Recently, due to tamper-resistance …

Improvement of user authentication protocol with anonymity for wireless communications

B Hu, M BAO, NA DONG - Kuwait Journal of Science, 2014 - journalskuwait.org
To design a mobile user authentication protocol with anonymity for the global mobile
network is a challenge, since wireless network is more vulnerable to attacks and mobile …

A novel user authentication scheme with anonymity for wireless communications

J Niu, X Li - Security and Communication Networks, 2014 - Wiley Online Library
User authentication and privacy protection are important issues for wireless and mobile
communication systems such as GSM, 3G, and 4G wireless networks. Recently, Yoon et al …

Efficient authentication protocol with anonymity and key protection for mobile Internet users

Y Jiang, Y Zhu, J Wang, Y Xiang - Journal of Parallel and Distributed …, 2020 - Elsevier
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is
crucial to secure communication between the mobile devices held by users and a remote …