Y Choi, J Nam, D Lee, J Kim, J Jung… - The Scientific World …, 2014 - Wiley Online Library
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the …
T Maitra, D Giri - Journal of medical systems, 2014 - Springer
The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or …
Authentication plays an important role in an open network environment in order to authenticate two communication parties among each other. Authentication protocols should …
D Mishra - arXiv preprint arXiv:1401.4790, 2014 - arxiv.org
Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its …
Due to the global mobility networks (GLOMONET) that develop fast and provide roaming service for the user, several security authentication techniques have been focused. The …
Y Choi, D Won - Cryptology ePrint Archive, 2014 - eprint.iacr.org
A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication …
Y Choi, D Lee, J Kim, J Jung, D Won - Conference Title, 2014 - researchgate.net
ABSTRACT A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An's scheme …
C Cai, Y Zhu, B Wang - 2014 IEEE 17th International …, 2014 - ieeexplore.ieee.org
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in …