A Secure and Efficient ECC‐Based Anonymous Authentication Protocol

F Wang, G Xu, L Gu - Security and Communication Networks, 2019 - Wiley Online Library
Nowadays, remote user authentication protocol plays a great role in ensuring the security of
data transmission and protecting the privacy of users for various network services. In this …

An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card

V Odelu, AK Das, A Goswami - Journal of Information Security and …, 2015 - Elsevier
The authentication protocols are trusted components in a communication system in order to
protect sensitive information against a malicious adversary in the client-server environment …

[PDF][PDF] A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem.

X Zhang, B Wang, W Wang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Along with the large-scale proliferation of network and information technology, users can
obtain the information resources conveniently via intelligent device. Authentication …

Secure and authentic anonymous roaming service

PK Roy, A Bhattacharya - Wireless Personal Communications, 2022 - Springer
Due to the infrastructure provided by the GLOobal MObility NETwork, mobile users are able
to access many network services anytime and anywhere, even in a roaming environment …

An improvement of the remote authentication scheme for anonymous users using an elliptic curve cryptosystem

MS Hwang, EF Cahyadi, CY Yang… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
It is convenient to obtain the information resources via intelligent devices over cloud
systems. The user authentication mechanism is a fundamental tool for ensuring the validity …

An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks

D Xie, J Yang, W Bian, F Chen… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In mobile edge computing, the computing tasks of IoT terminal devices with limited
computing power often need to be offloaded to servers for processing. However, there are …

A lightweight anonymous mutual authentication with key agreement protocol on ECC

W Zhang, D Lin, H Zhang, C Chen… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Recently, Goutham et al. proposed an ID-based user authentication with key agreement on
elliptic curve cryptography (ECC), which is suitable to be applied in client …

An anonymous authentication scheme with the enhanced security for wireless communications

R Chen, D Peng - Wireless Personal Communications, 2017 - Springer
In wireless communication system, a good protocol should satisfy many requirements: user
identity authentication, privacy protection, computational efficiency and resist some known …

Security analysis on “anonymous authentication scheme for smart home environment with provable security”

M Xu, Q Dong, M Zhou, C Wang… - … and Mobile Computing, 2020 - Wiley Online Library
As an important application of the Internet of Things, smart home has greatly facilitated our
life. Since the communication channels of smart home are insecure and the transmitted data …

An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards

RA Goutham, GJ Lee, KY Yoo - Proceedings of the 30th Annual ACM …, 2015 - dl.acm.org
In recent times, Debiao et al. proposed an ID-based user authentication with key agreement
protocol on elliptic curve cryptography (ECC). Conversely, our analysis shows that their …