A generic framework for three-factor authentication: Preserving security and privacy in distributed systems

X Huang, Y Xiang, A Chonka, J Zhou… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
As part of the security within distributed systems, various services and resources need
protection from unauthorized use. Remote authentication is the most commonly used …

An efficient generic framework for three-factor authentication with provably secure instantiation

J Yu, G Wang, Y Mu, W Gao - IEEE transactions on information …, 2014 - ieeexplore.ieee.org
Remote authentication has been widely studied and adapted in distributed systems. The
security of remote authentication mechanisms mostly relies on one of or the combination of …

SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments

NMR Lwamo, L Zhu, C Xu, K Sharif, X Liu, C Zhang - Information Sciences, 2019 - Elsevier
The rapid increase in user base and technological penetration has enabled the use of a
wide range of devices and applications. The services are rendered to these devices from …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics

CI Fan, YH Lin - IEEE Transactions on Information Forensics …, 2009 - ieeexplore.ieee.org
A three-factor authentication scheme combines biometrics with passwords and smart cards
to provide high-security remote authentication. Most existing schemes, however, rely on …

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks

F Wu, L Xu, S Kumari, X Li - Computers & Electrical Engineering, 2015 - Elsevier
The biometrics, the password and the storage device are the elements of the three-factor
authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme …

Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography

B Ying, A Nayak - Journal of network and computer applications, 2019 - Elsevier
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous
mutual authentication protocol needs to be developed for complex 5G networks. In this …

Robust biometrics-based authentication scheme for multiserver environment

D He, D Wang - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
The authentication scheme is an important cryptographic mechanism, through which two
communication parties could authenticate each other in the open network environment. To …

A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC

P Chandrakar, H Om - Computer Communications, 2017 - Elsevier
With the rapid growth of the computer and the Internet technology, various types of services
are provided through the Internet such as e-banking, e-rail, e-commerce, online game, etc …

A new remote user authentication scheme for multi-server architecture

IC Lin, MS Hwang, LH Li - Future Generation Computer Systems, 2003 - Elsevier
Remote user authentication is used to validate the legitimacy of a remote login user.
Conventional user authentication schemes are suited to solve the privacy and security …