2016
DOI: 10.21090/ijaerd.031122
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Based Remote Login Password Authentication Scheme Using Smart Card

Abstract: Abstract-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Thandra et al (2016) needs 2T exp + 3T mul + 3T hash computational cost for registration phase, 4T exp + 4T mul + 2T hash for login phase and 3T exp + 6T mul + 2T hash for authentication phase. Pooja and Pramav (2016) needs 3T mul + 7T hash + 2T ⊕ computational cost for registration phase, 4T mul + 8T hash + 4T ⊕ for login phase and 2T mul + 5T hash + 3T ⊕ for authentication phase. Liu et al (2017) needs 7T hash + 2T ⊕ computational cost for registration phase, 4T hash + 4T ⊕ for login phase and 9T hash + 12T ⊕ for authentication phase.…”
Section: Resistance To Stolen Smart Card Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…Thandra et al (2016) needs 2T exp + 3T mul + 3T hash computational cost for registration phase, 4T exp + 4T mul + 2T hash for login phase and 3T exp + 6T mul + 2T hash for authentication phase. Pooja and Pramav (2016) needs 3T mul + 7T hash + 2T ⊕ computational cost for registration phase, 4T mul + 8T hash + 4T ⊕ for login phase and 2T mul + 5T hash + 3T ⊕ for authentication phase. Liu et al (2017) needs 7T hash + 2T ⊕ computational cost for registration phase, 4T hash + 4T ⊕ for login phase and 9T hash + 12T ⊕ for authentication phase.…”
Section: Resistance To Stolen Smart Card Attackmentioning
confidence: 99%
“…No hashing is required in the mechanism. Xu et al (2009) 1Texp + 2Thash 3Texp + 5hash 3Texp + 4Thash 7Texp + 11Thash Not supported Kumar (2010) Texp + 2Thash + T⊕ 3Texp + 5Thash + 2T⊕ Thash + 3T⊕ 4Texp + 10Thash + 6T⊕ 2T⊕ Sood (2012) 4Texp + Thash + T⊕ 6Texp + 5Thash 6Texp + 4Thash + T⊕ 16Texp + 10Thash + 2T⊕ Texp + Thash Rajaram and Amutha (2012) 2Texp + 3Tmul2Texp + 3Tmul 3Texp + 2Tmul 7Texp + 8Tmul Not supported Thandra et al (2016) 2Texp + 3Tmul + 3Thash 4Texp + 4Tmul + 2Thash 3Texp + 6Tmul + 2Thash 9Texp + 13Tmul + 7Thash 2Texp + 3Tmul + 2Thash Pooja and Pramav (2016) 3Tmul + 7Thash + 2T⊕ 4Tmul + 8Thash + 4T⊕ 2Tmul + 5Thash + 3T⊕ 9Tmul + 20Thash + 9T⊕ 2Tmul + 3Thash Liu et al (2017) 7Thash + 2T⊕ 4Thash + 4T⊕ 9Thash + 12T⊕ 20Thash + 18T⊕ 3Thash + T⊕ Lee 20134Thash +2T⊕ 11Thash + 11T⊕ 4Thash + 4T⊕ 19Thash + 16T⊕ 11Thash + 6T⊕ Chien et al (2002) Thash + 2T⊕ Thash + 2T⊕ 4Thash + 4T⊕ 6Thash + 8T⊕ Not supported Hwang et al (2002) 2Thash + 2T⊕ Thash + 2T⊕ 2Thash + 2T⊕ 5Thash + 6T⊕ Thash + 2T⊕ Sun (2000) Thash Thash + T⊕ 2Thash + T⊕ 4Thash + 2T⊕ Not supported Lee et al (2002) 2Thash + 2T⊕ 3Thash + 3T⊕ 2Thash + 2T⊕ 7Thash + 7T⊕ 2Thash + 2T⊕…”
Section: Resistance To Stolen Smart Card Attackmentioning
confidence: 99%
See 2 more Smart Citations