SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments

NMR Lwamo, L Zhu, C Xu, K Sharif, X Liu, C Zhang - Information Sciences, 2019 - Elsevier
The rapid increase in user base and technological penetration has enabled the use of a
wide range of devices and applications. The services are rendered to these devices from …

Cryptanalysis of authentication protocol for WSN in IoT based electric vehicle environment

N Doshi - Materials Today: Proceedings, 2022 - Elsevier
The 21st century is of IoT (Internet of Things) wherein models like smart home, smart
environment, smart device, smart vehicle, etc. playing its vital role. Among these, the smart …

Lightweight mutual authentication scheme for protecting identity in insecure environment

X Wu, J Xu, B Fang - China Communications, 2018 - ieeexplore.ieee.org
Many improved authentication solutions were put forward, on purpose of authenticating
more quickly and securely. However, neither the overuse of hash function, or additional …

An Enhanced Version of Key Agreement System with User Privacy for Telecare Medicine Information Systems

T Limbasiya, N Doshi - Proceedings of First International Conference on …, 2016 - Springer
In the e-technology world, the growth of online system usage is very high. Hence it is also
necessary that security and privacy of users must secure. In the telecare medical system, a …

A User Privacy Conserving Authentication System Using Smart Card for Telecare Medicine Information Systems

T Limbasiya, N Doshi - … of the Second International Conference on …, 2016 - dl.acm.org
However, many remote user authentication schemes for telecare medicine information
systems have either insecurity or low efficiency or less privacy during the time of accessing …

Analysis of untraceable dynamic identity based remote user authentication scheme

T Limbasiya, N Doshi - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
In this world of e-technology, two users/systems requires to authenticate each other before
exchanging the information. For this, there are numerous schemes proposed and analyzed …