2012
DOI: 10.1016/j.jnca.2011.11.009
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
178
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 244 publications
(179 citation statements)
references
References 17 publications
1
178
0
Order By: Relevance
“…Moreover, in other scheme they confirmed that the password-based scheme of different researchers like (X. Li, Qiu et al, 2010;X. Li, Xiong et al, 2012;Juang et al, 2008) cannot resist Denial-of-Service (DoS) and offline password guessing attacks and failed to deliver strong user's anonymity as well as forward secrecy and mutual authentication.…”
Section: Related Workmentioning
confidence: 87%
See 1 more Smart Citation
“…Moreover, in other scheme they confirmed that the password-based scheme of different researchers like (X. Li, Qiu et al, 2010;X. Li, Xiong et al, 2012;Juang et al, 2008) cannot resist Denial-of-Service (DoS) and offline password guessing attacks and failed to deliver strong user's anonymity as well as forward secrecy and mutual authentication.…”
Section: Related Workmentioning
confidence: 87%
“…However, the diffidence of the protocols suggested in (Li, C. C.Lee, Liu, & C. W. Lee, 2011) and (Hsiang & Shih, 2009) was verified by researchers (X. Li, Qiu, Zheng, Chen, & J. Li, 2010;Li, Xiong, Ma, & Wang, 2012;Juang, Chen, & Liaw, 2008) correspondingly, which exposed that confrontation to impersonation, replay, stolen smart card and leak of verifier attacks could not be delivered.…”
Section: Related Workmentioning
confidence: 99%
“…In a multi-server IoT environment, a user may access the multi-server over a wireless network, which can be a serious security threat. The security threats that can occur in the network communication process of a multi-server IoT environment are as follows [11,12].…”
Section: Multi-server Iot Security Threatsmentioning
confidence: 99%
“…They have become an important criterion of an ideal remote authentication scheme. Most of remote user authentication schemes [4,[40][41][42] are designed and evaluated according to them, while none of the schemes could actually satisfy them simultaneously. Therefore, many researchers begin to pay more attention to e a l 2 Password dependent 3 No verification table 4 Freely chosen password by the users 5 F o r w a r d s e c r e c y 6…”
Section: Introductionmentioning
confidence: 99%