Muhaya, 2015 - Google Patents
Security analysis and improvement of a mutual authentication scheme under trusted computingMuhaya, 2015
- Document ID
- 3344323383262380536
- Author
- Muhaya F
- Publication year
- Publication venue
- International Journal of Ad Hoc and Ubiquitous Computing
External Links
Snippet
Recently, Yang et al. proposed a smart card and password–based mutual authentication scheme under trusted computing, and they claimed that their scheme can resist kinds of attacks. But they did not consider the stolen smart card attack which is an important attack in …
- 238000004458 analytical method 0 title description 13
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wazid et al. | Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS | |
Lee et al. | A three-factor anonymous user authentication scheme for Internet of Things environments | |
Islam | Design and analysis of an improved smartcard‐based remote user password authentication scheme | |
Yau et al. | Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems | |
Li et al. | Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update | |
Li et al. | Applying biometrics to design three‐factor remote user authentication scheme with key agreement | |
Kumari et al. | A provably secure biometrics-based authenticated key agreement scheme for multi-server environments | |
Lai et al. | Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol | |
Tan | An efficient biometrics-based authentication scheme for telecare medicine information systems | |
Li et al. | Robust three‐factor remote user authentication scheme with key agreement for multimedia systems | |
Lu et al. | A biometrics and smart cards‐based authentication scheme for multi‐server environments | |
Odelu et al. | An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card | |
Liu et al. | A secure data backup scheme using multi‐factor authentication | |
Maitra et al. | Security analysis and design of an efficient ECC‐based two‐factor password authentication scheme | |
Li et al. | Towards smart card based mutual authentication schemes in cloud computing | |
Karuppiah et al. | Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards | |
Odelu et al. | An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards | |
Santos-González et al. | Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks | |
Tsai et al. | A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card | |
Giri et al. | A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices | |
Wei et al. | Secure control protocol for universal serial bus mass storage devices | |
Amintoosi et al. | TAMA: three-factor authentication for multi-server architecture | |
Shakiba | Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks | |
Song et al. | Hardening password-based credential databases | |
Wu et al. | A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof |