2016
DOI: 10.1007/978-3-319-50209-0_40
|View full text |Cite
|
Sign up to set email alerts
|

A Three-Party Password Authenticated Key Exchange Protocol Resistant to Stolen Smart Card Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…The performance metrics related to existing similar authentication schemes and our technique is presented in Table 4. Here, we compared with Deebak et al's [38] technique, Chen et al's [39] [58]. To perform comparison amongst our authentication technique, the various operations are chosen such as modular exponential operations, Hash/MAC operations, and other properties of authentication technique.…”
Section: A Computation Costmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance metrics related to existing similar authentication schemes and our technique is presented in Table 4. Here, we compared with Deebak et al's [38] technique, Chen et al's [39] [58]. To perform comparison amongst our authentication technique, the various operations are chosen such as modular exponential operations, Hash/MAC operations, and other properties of authentication technique.…”
Section: A Computation Costmentioning
confidence: 99%
“…We observed that the value of T XOR is negligible in the experimentation. In Table 4, we compared our technique with other authentication techniques [38][39][40], [47], [56], and [57]. The computation cost of our technique is cost effective compared to the mentioned schemes.…”
Section: A Computation Costmentioning
confidence: 99%
“…Furthermore, we also compare our proposed method with other recently published 3PAKA schemes in terms of computation and communication loadings (Table 5) and system properties ( Table 6). The schemes [15,16] are smart card based schemes and some of their security and efficiency are based on smart cards. The properties "resistance to verifier-stolen attacks" of the schemes [11][12][13]17] are all "N/A" because they are password-based schemes without verifiers.…”
Section: Comparisonmentioning
confidence: 99%
“…Countermeasures for security attacks on remote user authentication schemesAttacks CountermeasuresStolen Smart Card Attack Biometrics-and OTP-based authentication schemes,97 Password Blinding 98 Domain Name Server (DNS) Spoofing Frequency hopping, Updated software versions and security patches, Split DNS 99 Mutual agreement between public and private sector over a common technological standard so as to promote application development for both consumers and traders is required. Hardware, software, applications, and the network must collaborate with each other allowing users to make effective use of smart cards.…”
mentioning
confidence: 99%