2012
DOI: 10.1016/j.jss.2011.10.049
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and secure multi-server authentication scheme with key agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
33
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(33 citation statements)
references
References 31 publications
0
33
0
Order By: Relevance
“…BAN logic has been widely used in different works such as [18][19][20] to reason about their security validation.…”
Section: Formal Proof Based On Ban Logicmentioning
confidence: 99%
“…BAN logic has been widely used in different works such as [18][19][20] to reason about their security validation.…”
Section: Formal Proof Based On Ban Logicmentioning
confidence: 99%
“…Focusing on the multi-server environment, in the last decade, some authors have introduced smart card based authentication schemes which migrate verification parameters to a personal device [2][3][4][5][6][7][8][9][10][11]. Lin et al [2] proposed an offline password changing scheme utilizing time stamps and the discrete logarithm problem.…”
Section: Introductionmentioning
confidence: 99%
“…In 2012, Tsaur et al's scheme [11] proposed a mutual authentication and key agreement scheme in a multi-server environment and in 2013, Xu et al's [12] proposed a scheme that can dynamically change the user identifier of each session. However, when user using the services server, there is a problem that user must be re-registered again.…”
Section: Introductionmentioning
confidence: 99%