Authentication schemes and methods: A systematic literature review

I Velásquez, A Caro, A Rodríguez - Information and Software Technology, 2018 - Elsevier
Context There is a great variety of techniques for performing authentication, like the use of
text passwords or smart cards. Some techniques combine others into one, which is known …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare

GS Gaba, M Hedabou, P Kumar, A Braeken… - Sustainable Cities and …, 2022 - Elsevier
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of
Things (IoT) applications, including e-healthcare services wherein smart devices collect …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

A secure three-factor user authentication and key agreement protocol for tmis with user anonymity

R Amin, GP Biswas - Journal of medical systems, 2015 - Springer
Telecare medical information system (TMIS) makes an efficient and convenient connection
between patient (s)/user (s) and doctor (s) over the insecure internet. Therefore, data …

Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems

SH Islam, MK Khan - Journal of medical systems, 2014 - Springer
Recently, many authentication protocols have been presented using smartcard for the
telecare medicine information system (TMIS). In 2014, Xu et al. put forward a two-factor …

Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems

R Amin, SKH Islam, GP Biswas, MK Khan… - Journal of medical …, 2015 - Springer
The E-health care systems employ IT infrastructure for maximizing health care resources
utilization as well as providing flexible opportunities to the remote patient. Therefore …

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

CT Li - IET Information Security, 2013 - Wiley Online Library
Password authentication has been widely used in computer networks to provide secure
remote access control. In this study, the authors show that the improved password …

Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps

SKH Islam - Nonlinear Dynamics, 2014 - Springer
With the aim of guaranteeing secure communication through public networks, three-factor
password authentication (TF-PWA) scheme plays a key role in many internet applications …