Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …

ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments

Z Ali, S Hussain, RHU Rehman, A Munshi… - IEEE …, 2020 - ieeexplore.ieee.org
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …

An enhanced and provably secure multi-factor authentication scheme for Internet-of-Multimedia-Things environments

K Mahmood, W Akram, A Shafiq, I Altaf… - Computers & Electrical …, 2020 - Elsevier
Abstract The Internet-of-Multimedia-Things (IoMT) opens new doors towards various
contingencies to improve applications and services through efficient multimedia data usage …

AGE: Authentication in gadget-free healthcare environments

T Kumar, A Braeken, AD Jurcut, M Liyanage… - Information Technology …, 2020 - Springer
Mobile and sensor related technologies are significantly revolutionizing the medical and
healthcare sectors. In current healthcare systems, gadgets are the prominent way of …

A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

F Wang, G Xu, G Xu, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
With the development of Internet of Things (IoT) technologies, Internet‐enabled devices
have been widely used in our daily lives. As a new service paradigm, cloud computing aims …

A secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments

J Zhao, W Bian, D Xu, B Jie, X Ding, W Zhou… - Ieee …, 2020 - ieeexplore.ieee.org
The emergence of multi-server authentication key protocol schemes provides a viable
environment for users to easily access the services of multiple legitimate servers through a …

REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs

M Al-Zubaidie, Z Zhang, J Zhang - Applied Sciences, 2020 - mdpi.com
Healthcare institutions require advanced technology to collect patients' data accurately and
continuously. The tradition technologies still suffer from two problems: performance and …

Mitigating the desynchronisation attack in multiserver environment

SU Jan, F Qayum - IET Communications, 2020 - Wiley Online Library
Currently, every user outsources a huge amount of shared secrets remotely from different
servers and utilises synchrony resources. To make all types of operations secure for the end …

A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity

H Xiong, Z Kang, J Chen, J Tao, C Yuan… - IEEE Systems …, 2020 - ieeexplore.ieee.org
As the indispensable part of the security demand in a distributed system, a variety of online
services need to be protected from unauthorized access. Multiserver authentication (MA) is …

Analysis and Improvement on an Authentication Protocol for IoT‐Enabled Devices in Distributed Cloud Computing Environment

B Kang, Y Han, K Qian, J Du - Mathematical Problems in …, 2020 - Wiley Online Library
Recently, a number of authentication protocols integrated with the Internet of Things (IoT)
and cloud computing have been proposed for secure access control on large‐scale IoT …