A User Anonymous Mutual Authentication Protocol |
Kumari, Saru
(Department of Mathematics, Ch. Charan Singh University)
Li, Xiong (School of Computer Science and Engineering, Hunan University of Science and Technology) Wu, Fan (Department of Computer Science and Engineering, Xiamen Institute of Technology) Das, Ashok Kumar (Center for Security, Theory and Algorithmic Research, International Institute of Information Technology) Odelu, Vanga (Department of Mathematics, Indian Institute of Technology Kharagpur) Khan, Muhammad Khurram (Centre of Excellence in Information Assurance (CoEIA), King Saud University) |
1 |
D. He, N. Kumar, and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks,” |
2 |
D. He, and D. Wang, “Robust biometrics-based authentication scheme for multi-server environment,” |
3 |
D. He, S Zeadally, N Kumar, and J.H. Lee, “Anonymous authentication for wireless body area networks with provable security,” |
4 |
X. Li, J. Niu, J. Liao, and W. Liang, “Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update,” |
5 |
S. Kumari, M.K. Gupta, and M. Kumar, “Cryptanalysis and security enhancement of chen et al.’s remote user authentication scheme using smart card,” |
6 |
S. Kumari, M.K. Gupta, M.K. Khan, and X. Li, “An improved timestamp-based password authentication scheme: comments, cryptanalysis and improvement,” |
7 |
D. Wang, and P. Wang, “On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions,” |
8 |
D. Wang, D. He, P. Wang, and C. Chu, “Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment,” |
9 |
M. Burrows, M. Abadi, and R. Needham, “A logic of authentication,” |
10 |
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement,” |
11 |
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing,” |
12 |
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual Verifiable Provable Data Auditing in Public Cloud Storage,” |
13 |
L. Lamport, “Password authentication with insecure communication,” |
14 |
X Li, J Niu, S Kumari, J Liao, and W Liang, “An enhancement of a smart card authentication scheme for multi-server architecture,” |
15 |
G. Horng, “Password authentication without using password table,” |
16 |
J.K. Jan, and Y.Y. Chen, “Paramita Wisdom’ Password authentication scheme without verification tables,” |
17 |
P. Guo, J. Wang, B. Li, and S.Y. Lee, “A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks,” |
18 |
X. Li, J. Niu, M. K. Khan, J. Liao, and X. Zhao, “Robust three-factor remote user authentication scheme with key agreement for multimedia systems,” |
19 |
M.S. Hwang, C.C. Lee, and Y.L. Tang, “A simple remote user authentication scheme,” |
20 |
C.C. Lee, and M.S. Hwang, and W.P. Yang, “Flexible remote user authentication scheme using smart cards,” |
21 |
M.L. Das, A. Saxena, and V.P. Gulati, “A dynamic ID-based remote user authentication scheme,” |
22 |
Y.C. Lee, “A new dynamic id-based user authentication scheme to resist smart card theft attack,” |
23 | A.K. Awasthi, “Comment on a dynamic id-based remote user authentication scheme,” arXiv preprint cs/0410011, 2004. |
24 |
H.Y. Chien, and C.H. Chen, “A remote password authentication preserving user anonymity,” in |
25 |
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” |
26 |
W. Shi and D. He, “A security enhanced mutual authentication scheme based on nonce and smart cards,” |
27 |
T.T. Truong, M.T. Tran, and A.D. Duong, “Enhanced dynamic authentication scheme (EDAS),” |
28 |
B.L. Chen, W.C. Kuo, and L.C. Wuu, “Robust smart-card-based remote user password authentication scheme,” |
29 |
T.T. Truong, and M.T. Tran and A.D. Duong “Modified dynamic ID-based user authentication scheme resisting smart-card-theft attack,” |
30 |
F. Wen, D. Guo, and X. Li, “Cryptanalysis of a new dynamic id-based user authentication scheme to resist smart-card-theft attack,” |
31 |
P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in |
32 |
M.S. Hwang, and L.H. Li, “A New Remote User Authentication Scheme Using Smart Cards,” |
33 |
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” |
34 |
N. Koblitz, “Elliptic curve cryptosystems,” |
35 |
D. Hankerson, A. Menezes, and S. Vanstone, |
36 |
M.K. Khan, S.K. Kim, and K. Alghathbar, “Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic id-based remote user authentication scheme,” |
37 |
W.C. Ku, and S.T. Chang, “Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards,” |
38 |
S. Kumari, and M.K. Khan, “More secure smart card based remote user password authentication scheme with user anonymity,” |
39 |
D. He, N. Kumar, H. Shen, and J.H. Lee, “One-to-many authentication for access control in mobile pay-TV systems,” |
40 |
S. Kumari, and M.K. Khan, “Cryptanalysis and improvement of ‘A robust smart-card-based remote user password authentication scheme,” |
41 |
D. Wang, Q. Gu, H. Cheng and P. Wang, “The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes,” in |
42 | K.M. Martin, “Everyday cryptography: Fundamental principles and applications,” Oxford University Press, Chapter 13, p. 495, 2012. Article (CrossRef Link) |
43 |
L. Zhang, S. Tang, and S. Zhu, “An energy efficient authenticated key agreement protocol for SIP-based green VoIP Networks,” |
44 |
Q. Jiang, J. Ma, G. Li, and X. Li. “Improvement of robust smart-card-based password authentication scheme,” |
45 |
R. Canetti, and H. Krawczyk, “Analysis of key exchange schemes and their use for building secure channels,” in |
46 |
Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He., “A privacy preserving three-factor authentication protocol for e-health clouds,” |
![]() |