Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment

S Chatterjee, S Roy, AK Das… - … on Dependable and …, 2016 - ieeexplore.ieee.org
Multi-server environment is the most common scenario for a large number of enterprise
class applications. In this environment, user registration at each server is not recommended …

A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment

S Banerjee, V Odelu, AK Das, J Srinivas… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
With the ever increasing adoption rate of Internet-enabled devices [also known as Internet of
Things (IoT) devices] in applications such as smart home, smart city, smart grid, and …

An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem

Z Zhao - Journal of medical systems, 2014 - Springer
With the development of wireless networks and medical sensors, wireless body area
networks are playing more and more important role in the field of healthcare service. The …

A distributed authentication scheme based on smart contract for roaming service in mobile vehicular networks

K Xue, X Luo, Y Ma, J Li, J Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure and real-time communication is an essential condition in mobile vehicular networks,
and this requires secure authentication and seamless access enabled by roaming services …

Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEe …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) acts as an umbrella for the Internet-enabled devices for various
applications, such as smart home, smart city, smart grid, and smart healthcare. The …

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

N Kumar, K Kaur, SC Misra, R Iqbal - Peer-to-Peer Networking and …, 2016 - Springer
Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing
technologies with an aim to provide uninterrupted services to the moving clients even on-the …

A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications

A Ostad-Sharif, D Abbasinezhad-Mood… - Journal of medical …, 2019 - Springer
Telecare medicine information system (TMIS) has provided an efficient and convenient way
for communications of patients at home and medical staffs at clinical centers. To make these …

A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …

A secure anonymous authentication protocol for mobile services on elliptic curve cryptography

AG Reddy, AK Das, EJ Yoon, KY Yoo - IEEE access, 2016 - ieeexplore.ieee.org
Mobile user authentication is an essential topic to consider in the current communications
technology due to greater deployment of handheld devices and advanced technologies …

[HTML][HTML] Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme

C Wang, X Zhang, Z Zheng - Plos one, 2016 - journals.plos.org
With the security requirements of networks, biometrics authenticated schemes which are
applied in the multi-server environment come to be more crucial and widely deployed. In this …