2020
DOI: 10.1007/s12083-020-00929-y
|View full text |Cite
|
Sign up to set email alerts
|

A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…Assuming that the output length of the hash function h(.) and random numbers is 160 bits, the length of identifier is 128 bits and the timestamp is 64 bits, as can be seen in Table 8 and Figure 9, Shashidhara et al [1] and AMAPG enforce lower computational costs, respectively. Focusing on the M U communication costs as it is the resource constrain device, it can easily seen in Table 8, M U in Shashidhara et al's protocol and AMAPG in login and authentication phase sends 448 and 512 bits respectively.…”
Section: Security and Performance Comparisonmentioning
confidence: 98%
See 3 more Smart Citations
“…Assuming that the output length of the hash function h(.) and random numbers is 160 bits, the length of identifier is 128 bits and the timestamp is 64 bits, as can be seen in Table 8 and Figure 9, Shashidhara et al [1] and AMAPG enforce lower computational costs, respectively. Focusing on the M U communication costs as it is the resource constrain device, it can easily seen in Table 8, M U in Shashidhara et al's protocol and AMAPG in login and authentication phase sends 448 and 512 bits respectively.…”
Section: Security and Performance Comparisonmentioning
confidence: 98%
“…Xu et al also presented a new mutual authentication scheme. Thereafter, Shashidhara et al [1] proved that the Xu et al's protocol does not resist against stolen verifier, denial of service, privileged insider, and impersonation attacks. Besides, they showed that the Xu et al's protocol is unable to provide local password verification and also suffers from clock synchronization problem.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[ 16,18,19,22,55,59,[64][65][66][67]70,71] PFSP Public key technology is a necessary condition to achieve forward security, and the server-end has at least two public key operations.…”
Section: Design Principlesmentioning
confidence: 99%