[HTML][HTML] Cryptanalysis and improvement of ECC based authentication and key exchanging protocols

S Roy, C Khatwani - Cryptography, 2017 - mdpi.com
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication
protocols. In this work, various recent ECC-based authentication and key exchange …

Multi-factor authentication: A survey and challenges in V2X applications

A Ometov, S Bezzateev - 2017 9th International Congress on …, 2017 - ieeexplore.ieee.org
Today, the digitalization strides tremendously on all the sides of the modern society. One of
the enablers to keep this process secure is the authentication. It touches many different …

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks

Q Xie, Z Tang, K Chen - Computers & Electrical Engineering, 2017 - Elsevier
User authentication protocol is an important security mechanism for mobile networks.
Recently, Wu et al. proposed a biometrics-based three-factor user authentication scheme …

Research on mobile commerce payment management based on the face biometric authentication

W Feng, J Zhou, C Dan, Z Peiyan… - International journal of …, 2017 - inderscienceonline.com
This paper mainly put forward the mode of identification and secure payment based on face
recognition from a face bio-identification perspective. With the technology of face …

A novel multifactor two-server authentication scheme under the mobile cloud computing

Z Han, L Yang, Q Liu - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Because the authentication method based username-password has the disadvantage of
easy disclosure and low reliability, and also the excess password management degrades …

Multi-factor authentication and their approaches

S Singh - International Research Journal of Management, IT and …, 2017 - neliti.com
A multi-factor authentication is an approach to authentication which requires the
presentation of two or more of the three authentication factors: a knowledge factor (" …

An efficient biometric based remote user authentication technique for multi-server environment

Neha, K Chatterjee - Wireless Personal Communications, 2017 - Springer
With the increasing demand of remote user authentication process for accessing many
Internet based applications, biometrics based authentication mechanisms are highly being …

A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing.

FUS WEI, Q Jiang, RJ Zhang… - Journal of Information …, 2017 - search.ebscohost.com
In the past decade, cloud computing has grown from being a promising business concept to
one of the fast growing segments of the information technology's industry. More and more …

Impact of access control and copyright in e-learning from user's perspective in the United Kingdom

G Akmayeva - 2017 - bura.brunel.ac.uk
The widespread adoption of E-Learning has largely been driven by the recommendations of
educational technologists seeking to convey the benefits of E-Learning as a valuable …

[PDF][PDF] An empirical evaluation of misconfiguration in Internet services

T Fiebig - 2017 - depositonce.tu-berlin.de
Within the past thirty years we have seen computers rise from room sized niche equipment
to handy pocket sized devices found in every household. At the same time there has been a …