[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Muhaya, 2015 - Google Patents

Security analysis and improvement of a mutual authentication scheme under trusted computing

Muhaya, 2015

Document ID
3344323383262380536
Author
Muhaya F
Publication year
Publication venue
International Journal of Ad Hoc and Ubiquitous Computing

External Links

Snippet

Recently, Yang et al. proposed a smart card and password–based mutual authentication scheme under trusted computing, and they claimed that their scheme can resist kinds of attacks. But they did not consider the stolen smart card attack which is an important attack in …
Continue reading at www.inderscienceonline.com (other versions)

Similar Documents

Publication Publication Date Title
Wazid et al. Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS
Lee et al. A three-factor anonymous user authentication scheme for Internet of Things environments
Islam Design and analysis of an improved smartcard‐based remote user password authentication scheme
Yau et al. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
Li et al. Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Kumari et al. A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
Lai et al. Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
Tan An efficient biometrics-based authentication scheme for telecare medicine information systems
Li et al. Robust three‐factor remote user authentication scheme with key agreement for multimedia systems
Lu et al. A biometrics and smart cards‐based authentication scheme for multi‐server environments
Odelu et al. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
Liu et al. A secure data backup scheme using multi‐factor authentication
Maitra et al. Security analysis and design of an efficient ECC‐based two‐factor password authentication scheme
Li et al. Towards smart card based mutual authentication schemes in cloud computing
Karuppiah et al. Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards
Odelu et al. An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards
Santos-González et al. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks
Tsai et al. A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card
Giri et al. A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices
Wei et al. Secure control protocol for universal serial bus mass storage devices
Amintoosi et al. TAMA: three-factor authentication for multi-server architecture
Shakiba Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
Song et al. Hardening password-based credential databases
Wu et al. A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof