[go: up one dir, main page]

×
Jul 1, 2020 · In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on stolen smart card attack.
May 12, 2011 · In a multi-server environment, a user only needs to register at the registration center (RC) once instead of registering in each server. After ...
Apr 16, 2020 · In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on the stolen smart attack.
This paper proposes an enhanced, efficient and secure user authentication scheme for use in any multiserver environment.
Missing: Improved | Show results with:Improved
This paper uses biometric information of user to enhance the security of the scheme by Kumar and Om. Moreover, we conducted rigorous security analyses.
May 26, 2020 · We propose a new secure, mutually authenticated key-sharing protocol for the multi-server environment to overcome the security flaws in their scheme.
Missing: Improved | Show results with:Improved
The multi-server authentication systems can enable a user to acquire services from multiple servers using single registration and with single set of credentials ...
People also ask
Very recently, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides ...
In a multi-server environment, a user only needs to register at the registration center once instead of repeatedly registering in each server.
A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wireless Personal Communications ...