Open Access
Issue
ITM Web Conf.
Volume 13, 2017
2nd International Conference on Computational Mathematics and Engineering Sciences (CMES2017)
Article Number 01020
Number of page(s) 14
DOI https://doi.org/10.1051/itmconf/20171301020
Published online 02 October 2017
  1. T. Maitra, Cryptanalysis of A Secure Remote User Authentication Scheme Using Smart Cards, CoRR abs/1502.04820 (2015) [Google Scholar]
  2. Y. Dodis, L. Reyzin, A. Smith, in Advances in Cryptology - EUROCRYPT 2004 (Springer Berlin Heidelberg, 2004), Vol. 3027 of Lecture Notes in Computer Science, pp. 523–540 [Google Scholar]
  3. L. Lamport, Password Authentication with Insecure Communication, Commun. ACM 24, 770 (1981) [CrossRef] [Google Scholar]
  4. A. Shimizu, T. Horioka, H. Inagaki, A Password Authentication Method for Contents Communications on the Internet, IEICE Tran. Communications E81-B, 1666 (1998) [Google Scholar]
  5. J. Xu, W.T. Zhu, D.G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards & Interfaces 31, 723 (2009) [CrossRef] [Google Scholar]
  6. X. Li, J. Niu, M.K. Khan, J. Liao, An enhanced smart card based remote user password authentication scheme, Journal of Network and Computer Applications 36, 1365 (2013) [CrossRef] [Google Scholar]
  7. T. Maitra, R. Amin, D. Giri, P.D. Srivastava, An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card, I. J. Network Security 18, 553 (2016) [Google Scholar]
  8. O. Mir, T. van der Weide, C.C. Lee, A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems, Journal of Medical Systems 39, 89 (2015) [Google Scholar]
  9. D. Giri, T. Maitra, R. Amin, P. Srivastava, An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems, Journal of Medical Systems 39, 145 (2014) [CrossRef] [Google Scholar]
  10. K.H. Yeh, A lightweight authentication scheme with user untraceability, Frontiers of Information Technology & Electronic Engineering 16, 259 (2015) [CrossRef] [Google Scholar]
  11. C. Guo, C.C. Chang, Chaotic maps-based password-authenticated key agreement using smart cards, Communications in Nonlinear Science and Numerical Simulation 18, 1433 (2013) [CrossRef] [MathSciNet] [Google Scholar]
  12. R. Amin, T. Maitra, S.P. Rana, An Improvement of Wang. et. al.’s Remote User Authentication Scheme against Smart Card Security Breach, International Journal of Computer Applications 75, 37 (2013) [CrossRef] [Google Scholar]
  13. C.C. Chang, C.Y. Sun, A Secure and Efficient Authentication Scheme for E-coupon Systems, Wireless Personal Communications 77, 2981 (2014) [CrossRef] [Google Scholar]
  14. R. Amin, T. Maitra, D. Giri, An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card, International Journal of Computer Applications 69, 1 (2013) [CrossRef] [Google Scholar]
  15. T. Maitra, M.S. Obaidat, S.H. Islam, D. Giri, R. Amin, Security analysis and design of an efficient ECC-based two-factor password authentication scheme, Security and Communication Networks 9, 4166 (2016) [CrossRef] [Google Scholar]
  16. T. Maitra, M.S. Obaidat, R. Amin, S.H. Islam, S.A. Chaudhry, D. Giri, A robust ElGamal-based passwordauthentication protocol using smart card for client-server communication, International Journal of Communication Systems 30 (2017) [CrossRef] [Google Scholar]
  17. C.T. Li, M.S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications 33, 1 (2010) [Google Scholar]
  18. A. Das, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards, Information Security, IET 5, 145 (2011) [CrossRef] [Google Scholar]
  19. Y. An, Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards, Journal of Biomedicine and Biotechnology. 2012, Article ID 519723 1 (2012) [Google Scholar]
  20. X. Li, J. Niu, M.K. Khan, J. Liao, X. Zhao, Robust three-factor remote user authentication scheme with key agreement for multimedia systems, Security and Communication Networks (2014) [Google Scholar]
  21. C.C. Lee, C.W. Hsu, A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps, Nonlinear Dynamics 71, 201 (2013) [CrossRef] [Google Scholar]
  22. Z. Tan, An efficient biometrics-based authentication scheme for telecare medicine information systems, Przeglad Elektrotechniczny pp. 200–204 (2013) [Google Scholar]
  23. X. Yan, W. Li, P. Li, J. Wang, X. Hao, P. Gong, A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems 37, 9972 (2013) [CrossRef] [Google Scholar]
  24. D. Mishra, S. Mukhopadhyay, A. Chaturvedi, S. Kumari, M. Khan, Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems 38 24 (2014) [CrossRef] [Google Scholar]
  25. T. Maitra, D. Giri, An Efficient Biometric and Password-Based Remote User Authentication using Smart Card for Telecare Medical Information Systems in Multi-Server Environment, Journal of Medical Systems 38, 142 (2014) [CrossRef] [Google Scholar]
  26. D. He, N. Kumar, J.H. Lee, R. Sherratt, Enhanced three-factor security protocol for consumer USB mass storage devices, Consumer Electronics, IEEE Transactions on 60, 30 (2014) [CrossRef] [Google Scholar]
  27. D. Giri, R.S. Sherratt, T. Maitra, R. Amin, Efficient biometric and password based mutual authentication for consumer USB mass storage devices, IEEE Transactions on Consumer Electronics 61, 491 (2015) [CrossRef] [Google Scholar]
  28. D. Giri, R.S. Sherratt, T. Maitra, A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB Mass Storage Devices, IEEE Transactions on Consumer Electronics 62, 283 (2016) [CrossRef] [Google Scholar]
  29. H.F. Huang, H.W. Chang, P.K. Yu, Enhancement of Timestamp-based User Authentication Scheme with Smart Card, International Journal of Network Security 16, 463 (2014) [Google Scholar]
  30. R. Amin, T. Maitra, D. Giri, P.D. Srivastava, Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card, Wireless Personal Communications (2017) [Google Scholar]
  31. D. Dolev, A.C. Yao, On the security of public key protocols, Information Theory, IEEE Transactions on 29 198 (1983) [CrossRef] [MathSciNet] [Google Scholar]
  32. P. Kocher, J. Jaffe, B. Jun, Differential Power Analysis, in Advances in Cryptology “CRYPTO’99 (1999), Vol. 1666 of Lecture Notes in Computer Science, pp. 388–397 [Google Scholar]
  33. T.S. Messerges, E.A. Dabbish, R.H. Sloan, Examining Smart-Card Security Under the Threat of Power Analysis Attacks, IEEE Trans. Comput. 51, 541 (2002) [CrossRef] [MathSciNet] [Google Scholar]
  34. S.K. Sood, A.K. Sarje, K. Singh, A secure dynamic identity based authentication protocol for multi-server architecture, Journal of Network and Computer Applications 34, 609 (2011) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.