References
- Ch, S. A., Sher, M., Ghani, A., Naqvi, H., & Irshad, A., "An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography," Multimedia Tools and Applications, 74(5), 1711-1723, 2015. https://doi.org/10.1007/s11042-014-2283-9
- Lamport L., "Password authentication with insecure communication," ACM Communication, 24 (11), 770-772, 1981. https://doi.org/10.1145/358790.358797
- Sun D, Huai J, Sun J, Li J, Zhang J, Feng Z., "Improvements of Juang's password authenticated key agreement scheme using smart cards," IEEE Transactions on Industrial Electronics, 56(6), 2284-2291, 2009. https://doi.org/10.1109/TIE.2009.2016508
- Yu J, Wang G, Mu Y, Gao W., "An efficient generic framework for three-factor authentication with provably secure instantiation," IEEE Transactions on Information Forensics and Security, 9(12), 2302-2313, 2014. https://doi.org/10.1109/TIFS.2014.2362979
- Lu Y, Li L, Yang Y., "Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps," Journal of Medical Systems, 2015.
- Li C, Hwang M., "An efficient biometrics-based remote user authentication scheme using smart cards," Journal of Network and Computer Applications, 33(1), 1-5, 2010. https://doi.org/10.1016/j.jnca.2009.08.001
- He D, Kumar N, Chen J, Lee C, Chilamkurti N, Yeo S., "Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks," Multimedia Systems, 21(1), 49-60, 2013. https://doi.org/10.1007/s00530-013-0346-9
- Lu Y, Li L, Peng H, Yang Y., "An enhanced biometric based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem," Journal of Medical Systems, 39(3), 1-8, 2015.
- Wang D, Ma C, Gu D, Cui Z., "Cryptanalysis of two dynamic ID-based remote user authentication schemes for multi-server architecture," Network and System Security, 7645, 462-475, 2012.
- Li X, Ma J, Wang W, Liu C., "A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments," Mathematical and Computer Modelling, 58, 85-95, 2013. https://doi.org/10.1016/j.mcm.2012.06.033
- He D, Zeadally S., "Authentication protocol for an ambient assisted living system," IEEE Communications Magazine, 53(1): 71-77, 2015. https://doi.org/10.1109/MCOM.2015.7010518
- Tsai J., "Efficient multi-server authentication scheme based on one-way hash function without verification table," Computers & Security, 27(3-4): 115-121, 2008. https://doi.org/10.1016/j.cose.2008.04.001
- Yang D, Yang B., "A biometric password-based multi-server authentication scheme with smart card," IEEE International Conference on Computer Design and Applications (ICCDA), 5, 554-559, 2010.
- Irshad, A., Sher, M., Chaudhary, S. A., Naqvi, H., & Farash, M. S., "An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre," The Journal of Supercomputing, 72(4), 1623-1644, 2016. https://doi.org/10.1007/s11227-016-1688-9
- Chaudhry, S. A., Khan, I., Irshad, A., Ashraf, M. U., Khan, M. K., & Ahmad, H. F., "A provably secure anonymous authentication scheme for Session Initiation Protocol," Security and Communication Networks, 2016.
- Irshad, A., Sher, M., Nawaz, O., Chaudhry, S. A., Khan, I., & Kumari, S., "A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme," Multimedia Tools and Applications, 1-27, 2016.
- Yoon E, Yoo K., "Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem," Journal of Supercomputing, 63(1), 235-255, 2013. https://doi.org/10.1007/s11227-010-0512-1
- He D., "Security flaws in a biometrics-based multi-server authentication with key agreement scheme," IACR Cryptology, 1-9, 2011.
- Irshad, A., Sher, M., Chaudhry, S. A., Xie, Q., Kumari, S., & Wu, F., "An improved and secure chaotic map based authenticated key agreement in multi-server architecture," Multimedia Tools and Applications, 1-38, 2017.
- Chuang M, Chen M., "An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics," Expert Systems with Applications, 41, 1411-1418, 2014. https://doi.org/10.1016/j.eswa.2013.08.040
- Mishra D, Ashok K. D, Mukhopadhyay S., "A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards," Expert Systems with Applications, 41(18), 8129-8143, 2014. https://doi.org/10.1016/j.eswa.2014.07.004
- Li, X., Niu, J., Kumari, S., Liao, J., & Liang, W., "An enhancement of a smart card authentication scheme for multi-server architecture," Wireless Personal Communications, 80(1), 175-192, 2015. https://doi.org/10.1007/s11277-014-2002-x
- Wu, F., Xu, L., Kumari, S., & Li, X., "A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks," Computers & Electrical Engineering, 45, 274-285, 2015. https://doi.org/10.1016/j.compeleceng.2015.02.015
- He D, Wang D., "Robust biometrics-based authentication scheme for multiserver environment," IEEE Systems Journal, 9(3), 816-823, 2015. https://doi.org/10.1109/JSYST.2014.2301517
- Burrow M, Abadi M, Needham R., "A logic of authentication," ACM Transactions on Computer Systems, 8(1), 18-36, 1990. https://doi.org/10.1145/77648.77649
- Li, X., Niu, J., Kumari, S., Khan, M. K., Liao, J., & Liang, W., "Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol," Nonlinear Dynamics, 80(3), 1209-1220, 2015. https://doi.org/10.1007/s11071-015-1937-0
- Jiang, Q., Ma, J., Lu, X., & Tian, Y., "An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks," Peer-to-Peer Networking and Applications, 8(6), 1070-1081, 2015. https://doi.org/10.1007/s12083-014-0285-z
- Jiang, Q., Ma, J., Li, G., & Li, X., "Improvement of robust smart-card-based password authentication scheme," International Journal of Communication Systems, 28(2), 383-393, 2015. https://doi.org/10.1002/dac.2644
- Jiang, Q., Khan, M. K., Lu, X., Ma, J., & He, D., "A privacy preserving three-factor authentication protocol for e-Health clouds," The Journal of Supercomputing, 72(10), 3826-3849, 2016. https://doi.org/10.1007/s11227-015-1610-x
- Li, X., Niu, J., Kumari, S., Islam, S. H., Wu, F., Khan, M. K., & Das, A. K., "A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wire. Pers. Comm., 89(2), 569-597, 2016. https://doi.org/10.1007/s11277-016-3293-x
- Lu, Y., Li, L., Peng, H., & Yang, Y., "A biometrics and smart cards-based authentication scheme for multi-server environments," Security and Communication Networks, 8(17), 3219-3228, 2015. https://doi.org/10.1002/sec.1246
- Dodis Y, Reyzin L, Smith A., "Fuzzy extractors: how to generate strong keys from biometrics and other noisy data" Advances in Cryptology-EUROCRYPT, 3027: 523-540, 2004.
- Dodis Y, Kanukurthi B, Katz J, Reyzin L, Smith A., "Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets," IEEE Transactions on Information Theory, 58(9), 6207-6222, 2012. https://doi.org/10.1109/TIT.2012.2200290
- Odelu, V., Ashok, K. D., and Adrijit G. "A secure biometrics-based multi-server authentication protocol using smart cards," IEEE Transactions on Information Forensics and Security, 10(9), 1953-1966, 2015. https://doi.org/10.1109/TIFS.2015.2439964
- Koblitz, N., Elliptic Curve Cryptosystems. Math. Of Comp., Vol. 48, 203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Ashok, K. D., Odelu, V., and Adrijit G., "A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS," Journal of Medical Systems, 39(9), 1-24, 2015. https://doi.org/10.1007/s10916-014-0182-2
- Ashok, K. D., "A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems," Journal of medical systems, 39(3), 1-20, 2015. https://doi.org/10.1007/s10916-014-0182-2
- Chatterjee, S., and Das, A.K., "An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks," Secur. Commun. Netw., 8(9), 1752-1771, 2015. https://doi.org/10.1002/sec.1140
- Das, A.K., Paul, N.R., Tripathy, L., "Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem," Information Sciences, 209(C), 80-92, 2012. https://doi.org/10.1016/j.ins.2012.04.036
- Chaudhry SA, Farash MS, Naqvi H, Islam SH, Shon T, Sher M, "A robust and efficient privacy aware handover authentication scheme for wireless networks," Wireless Personal Communication, 2015.
- Xie, Q., Hu, B., Dong, N., & Wong, D. S., "Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems," PLoS One, 9(7), e102,747, 2014. https://doi.org/10.1371/journal.pone.0102747
- Odelu, V., Das, A. K., & Goswami, A., "SEAP: secure and efficient authentication protocol for NFC applications using pseudonyms," IEEE Transactions on Consumer Electronics, 62(1), 30-38, 2016. https://doi.org/10.1109/TCE.2016.7448560
- Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., & Kumar, N., "An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography," Journal of medical systems, 39(11), 1-18, 2015. https://doi.org/10.1007/s10916-014-0182-2
- Kilinc, H. H., & Yanik, T., "A survey of SIP authentication and key agreement schemes," Communications Surveys & Tutorials, IEEE, 16(2), 1005-1023, 2014. https://doi.org/10.1109/SURV.2013.091513.00050
Cited by
- Performance analysis of NTRU algorithm with non-post-quantum algorithms vol.24, pp.5, 2021, https://doi.org/10.1080/09720529.2021.1932926
- Authentication in opportunistic networks: State and art vol.24, pp.6, 2018, https://doi.org/10.1080/09720529.2021.1873254