2018
DOI: 10.5539/nct.v3n1p6
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis

Abstract: Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts ("modules"), which can create the chance for extra enhancement, inconsiderable improvement, and prominent maintainability. In client-server computing, total extensive modules don't need to be accomplished within the similar memory space totally but can execute independently on a suitable hardware and software platform according to their … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
2
0
2

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 22 publications
0
2
0
2
Order By: Relevance
“…On the other hand, the scheme developed by the author of [42] suffers from insider attacks and cannot provide user untraceability. According to the author of [43], the protocol used in [44] is vulnerable to impersonation, reply, DoS attacks, and fails to provide strong user anonymity. However, the author also claims that their protocol has high computation and communication costs, storage costs, and no balance between performance and security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the scheme developed by the author of [42] suffers from insider attacks and cannot provide user untraceability. According to the author of [43], the protocol used in [44] is vulnerable to impersonation, reply, DoS attacks, and fails to provide strong user anonymity. However, the author also claims that their protocol has high computation and communication costs, storage costs, and no balance between performance and security.…”
Section: Related Workmentioning
confidence: 99%
“…However, the author also claims that their protocol has high computation and communication costs, storage costs, and no balance between performance and security. Meanwhile, the author [43] proposed a solution for [44] to achieve high security, tractability, robustness, and lightweight feature. Hence, an authentication scheme using a smart card is proposed the author of [45], which offers reliable information delivery and mutual authentication between server and client.…”
Section: Related Workmentioning
confidence: 99%
“…Arquitectura: Implementan la arquitectura de software Cliente-Servidor [15], [11], como se muestra en la Figura 1. Esta arquitectura es de gran ventaja y permite que se pueda intervenir en el código fácilmente y realizar cambios que comprenden el módulo de seguridad a implementar.…”
Section: Las Tecnologías Y Dispositivos Que Usanunclassified
“…Cliente: Esta construido en React Js, [15], la gran ventaja es que permite un mayor dinamismo en la página por los diferentes componentes que se reutilizan.…”
Section: Las Tecnologías Y Dispositivos Que Usanunclassified