A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography
Authors
Keywords
-
Journal
SENSORS
Volume 18, Issue 7, Pages 2394
Publisher
MDPI AG
Online
2018-07-24
DOI
10.3390/s18072394
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
- (2018) Ding Wang et al. IEEE Transactions on Industrial Informatics
- Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol
- (2018) Shuming Qiu et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
- (2018) Shuming Qiu et al. PLoS One
- A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
- (2018) Shuming Qiu et al. IEEE Access
- Zipf’s Law in Passwords
- (2017) Ding Wang et al. IEEE Transactions on Information Forensics and Security
- Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
- (2017) Jaewook Jung et al. SENSORS
- Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
- (2017) Ruhul Amin et al. WIRELESS PERSONAL COMMUNICATIONS
- A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card
- (2017) Jangirala Srinivas et al. WIRELESS PERSONAL COMMUNICATIONS
- Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
- (2017) Saru Kumari et al. Journal of Ambient Intelligence and Humanized Computing
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
- (2016) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- A provably secure anonymous authentication scheme for Session Initiation Protocol
- (2016) Shehzad Ashraf Chaudhry et al. Security and Communication Networks
- Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks
- (2016) YoHan Park et al. SENSORS
- Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
- (2015) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
- (2015) Ding Wang et al. INFORMATION SCIENCES
- A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
- (2015) Debiao He et al. INFORMATION SCIENCES
- A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
- (2015) Mohammad Sabzinejad Farash et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
- (2015) Shehzad Ashraf Chaudhry et al. JOURNAL OF MEDICAL SYSTEMS
- Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks
- (2015) I-Pin Chang et al. SENSORS
- Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
- (2014) Ding Wang et al. Ad Hoc Networks
- On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
- (2014) Ding Wang et al. Computer Networks
- Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
- (2014) SK Hafizul Islam et al. JOURNAL OF MEDICAL SYSTEMS
- A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
- (2014) Zezhong Zhang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
- (2014) Hamed Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2014) Younsung Choi et al. SENSORS
- An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
- (2014) Xiong Li et al. WIRELESS PERSONAL COMMUNICATIONS
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- An Enhanced Authenticated Key Agreement for Session Initiation Protocol
- (2013) Mohammad Sabzinejad Farash et al. Information Technology and Control
- Robust Smart Card Authentication Scheme for Multi-server Architecture
- (2013) Ravi Singh Pippal et al. WIRELESS PERSONAL COMMUNICATIONS
- A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2013) Wenbo Shi et al. International Journal of Distributed Sensor Networks
- An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
- (2012) Debiao He Ad Hoc Networks
- The Impact of TLS on SIP Server Performance: Measurement and Modeling
- (2012) Charles Shen et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
- (2012) Debiao He et al. Security and Communication Networks
- An improved timestamp-based remote user authentication scheme
- (2011) Amit K. Awasthi et al. COMPUTERS & ELECTRICAL ENGINEERING
- A new authenticated key agreement for session initiation protocol
- (2011) Qi Xie INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
- (2011) R. Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
- (2011) Hsiu-Lien Yeh et al. SENSORS
- Fingerprint Biometric-based Self-Authentication and Deniable Authentication Schemes for the Electronic World
- (2009) MuhammadKhurram Khan IETE TECHNICAL REVIEW
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search