Sadqi et al., 2015 - Google Patents
A secure and efficient user authentication scheme for the webSadqi et al., 2015
View PDF- Document ID
- 9969017465011178889
- Author
- Sadqi Y
- Asimi A
- Asimi Y
- Publication year
- Publication venue
- International Journal of Internet Technology and Secured Transactions
External Links
Snippet
User authentication is the'Achilles heel'of modern web applications security. Although strong schemes based on public key cryptography have been proposed, none of them is widely adopted. Specifically, they are difficult to use and expensive to deploy. In this paper, we …
- 210000000474 Heel 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care | |
Todorov | Mechanics of user identification and authentication: Fundamentals of identity management | |
US9698985B2 (en) | Authentication | |
EP2639997B1 (en) | Method and system for secure access of a first computer to a second computer | |
US8971540B2 (en) | Authentication | |
US9106644B2 (en) | Authentication | |
CN105871553A (en) | Identity-free three-factor remote user authentication method | |
Xiong et al. | A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity | |
WO2014069985A1 (en) | System and method for identity-based entity authentication for client-server communications | |
Kumar et al. | An efficient privacy-preserving id centric authentication in iot based cloud servers for sustainable smart cities | |
Kim et al. | On the security of two remote user authentication schemes for telecare medical information systems | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
Mumtaz et al. | An RSA based authentication system for smart IoT environment | |
Sharma et al. | A blockchain based secure communication framework for community interaction | |
Lee et al. | Secure and anonymous authentication scheme for mobile edge computing environments | |
Sharma et al. | Advanced multi-factor user authentication scheme for E-governance applications in smart cities | |
Mir et al. | Decentralized, Privacy‐Preserving, Single Sign‐On | |
Hussain et al. | An improved authentication scheme for digital rights management system | |
Song et al. | Hardening password-based credential databases | |
Li et al. | An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks | |
Aiash | A formal analysis of authentication protocols for mobile devices in next generation networks | |
Kumar et al. | Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication | |
Sadqi et al. | A secure and efficient user authentication scheme for the web | |
Gajek et al. | A browser-based kerberos authentication scheme | |
CN113545004A (en) | Authentication system with reduced attack surface |