2014
DOI: 10.1016/j.jisa.2014.09.006
|View full text |Cite
|
Sign up to set email alerts
|

A secure remote user mutual authentication scheme using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 65 publications
0
28
0
Order By: Relevance
“…We have presented security functionality comparison of our scheme with other related schemes under consideration and we have found that our scheme provides maximum security (refer to Table 2). After comparing the results from both Tables 1 and 2, we have found that the schemes (Chaturvedi et al, 2013;Karuppiah and Saravanan, 2014) have same security features, however they have more communication cost to achieve theses requirement. This makes our scheme better than other schemes.…”
Section: Performance Analysismentioning
confidence: 97%
See 2 more Smart Citations
“…We have presented security functionality comparison of our scheme with other related schemes under consideration and we have found that our scheme provides maximum security (refer to Table 2). After comparing the results from both Tables 1 and 2, we have found that the schemes (Chaturvedi et al, 2013;Karuppiah and Saravanan, 2014) have same security features, however they have more communication cost to achieve theses requirement. This makes our scheme better than other schemes.…”
Section: Performance Analysismentioning
confidence: 97%
“…Among the different approaches (Wu, 1995;Chien et al, 2001;Kumar et al, 2010;Liaw, 1995;Liaw and Lei, 1995;Das et al, 2004;Wang et al, 2004Wang et al, , 2009Wen and Li, 2012;Juan and Zou, 2013;Chaturvedi et al, 2013;Zhang et al, 2014;Leu and Hsieh, 2014;Ramesh and Bhaskaran, 2014;Karuppiah and Saravanan, 2014;Kumari and Om, 2015;Lee et al, 2013), some researchers have developed the remote login schemes using geometric approach, which was first discussed by Wu (1995) with simple implementation in the Euclidean plane. The Wu's scheme was modified by Chien et al (2001) in 2001 proposed a scheme using a circle in n-dimensional space.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Marimuthu et al, [21] have proposed a secure remote user mutual authentication scheme using smart cards to achieve security requirements which is limited only to password. Lu et al, [22] have proposed an efficient biometrics-based user authentication scheme for remote access using smart cards adopting SHA-256, to implement the one-way hash function and the random-number generator.…”
Section: Smart Card Securitymentioning
confidence: 99%
“…Smart cards bring less security vulnerabilities than only-password based authentication, and also their security deployment is cheaper than biometrics. Smart cards are considered a two-factor authentication mechanism, which is based in something possessed, that is the card, and something known, a password [2]. Also, smart cards' cryptographic capacity and portability are two features that make them one of the most widely adopted authentication methods [3].…”
Section: Introductionmentioning
confidence: 99%