J Yu, G Wang, Y Mu, W Gao - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Remote authentication has been widely studied and adapted in distributed systems. The security of remote authentication mechanisms mostly relies on one of or the combination of …
The rapid increase in user base and technological penetration has enabled the use of a wide range of devices and applications. The services are rendered to these devices from …
Despite two decades of intensive research, it remains a challenge to design a practical anonymous two-factor authentication scheme, for the designers are confronted with an …
CI Fan, YH Lin - IEEE Transactions on Information Forensics …, 2009 - ieeexplore.ieee.org
A three-factor authentication scheme combines biometrics with passwords and smart cards to provide high-security remote authentication. Most existing schemes, however, rely on …
F Wu, L Xu, S Kumari, X Li - Computers & Electrical Engineering, 2015 - Elsevier
The biometrics, the password and the storage device are the elements of the three-factor authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme …
B Ying, A Nayak - Journal of network and computer applications, 2019 - Elsevier
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks. In this …
D He, D Wang - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment. To …
With the rapid growth of the computer and the Internet technology, various types of services are provided through the Internet such as e-banking, e-rail, e-commerce, online game, etc …
IC Lin, MS Hwang, LH Li - Future Generation Computer Systems, 2003 - Elsevier
Remote user authentication is used to validate the legitimacy of a remote login user. Conventional user authentication schemes are suited to solve the privacy and security …