Wang et al., 2018 - Google Patents
An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environmentWang et al., 2018
View PDF- Document ID
- 8950970451561438400
- Author
- Wang C
- Ding K
- Li B
- Zhao Y
- Xu G
- Guo Y
- Wang P
- Publication year
- Publication venue
- Wireless Communications and Mobile Computing
External Links
Snippet
With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent. As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention. Though …
- 238000004458 analytical method 0 abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jiang et al. | Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy | |
Zhao et al. | Secure and efficient user authentication scheme based on password and smart card for multiserver environment | |
Wang et al. | Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme | |
Das et al. | An efficient multi‐gateway‐based three‐factor user authentication and key agreement scheme in hierarchical wireless sensor networks | |
Zhao et al. | A secure and effective anonymous authentication scheme for roaming service in global mobility networks | |
Li et al. | Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications | |
Jangirala et al. | A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards | |
Ali et al. | An efficient three factor–based authentication scheme in multiserver environment using ECC | |
Wang et al. | EIDM: A ethereum-based cloud user identity management protocol | |
Choi et al. | Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics | |
Tsai et al. | New dynamic ID authentication scheme using smart cards | |
Wang et al. | A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure | |
Khan et al. | [Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server | |
Wang et al. | A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment | |
Wang et al. | Revisiting Anonymous Two‐Factor Authentication Schemes for IoT‐Enabled Devices in Cloud Computing Environments | |
Wang et al. | An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment | |
Mumtaz et al. | An RSA based authentication system for smart IoT environment | |
Luo et al. | A secure and efficient identity‐based mutual authentication scheme with smart card using elliptic curve cryptography | |
Irshad et al. | An improved lightweight multiserver authentication scheme | |
Srinivas et al. | A self-verifiable password based authentication scheme for multi-server architecture using smart card | |
Chang et al. | An untraceable biometric-based multi-server authenticated key agreement protocol with revocation | |
Sharma et al. | Advanced multi-factor user authentication scheme for E-governance applications in smart cities | |
Bhattacharya et al. | ASPA-MOSN: An efficient user authentication scheme for phishing attack detection in mobile online social networks | |
Sudhakar et al. | A new three-factor authentication and key agreement protocol for multi-server environment | |
Andola et al. | An enhanced smart card and dynamic ID based remote multi-server user authentication scheme |