2013
DOI: 10.1007/978-3-642-45204-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 24 publications
0
20
0
Order By: Relevance
“…We have presented security functionality comparison of our scheme with other related schemes under consideration and we have found that our scheme provides maximum security (refer to Table 2). After comparing the results from both Tables 1 and 2, we have found that the schemes (Chaturvedi et al, 2013;Karuppiah and Saravanan, 2014) have same security features, however they have more communication cost to achieve theses requirement. This makes our scheme better than other schemes.…”
Section: Performance Analysismentioning
confidence: 97%
See 2 more Smart Citations
“…We have presented security functionality comparison of our scheme with other related schemes under consideration and we have found that our scheme provides maximum security (refer to Table 2). After comparing the results from both Tables 1 and 2, we have found that the schemes (Chaturvedi et al, 2013;Karuppiah and Saravanan, 2014) have same security features, however they have more communication cost to achieve theses requirement. This makes our scheme better than other schemes.…”
Section: Performance Analysismentioning
confidence: 97%
“…Among the different approaches (Wu, 1995;Chien et al, 2001;Kumar et al, 2010;Liaw, 1995;Liaw and Lei, 1995;Das et al, 2004;Wang et al, 2004Wang et al, , 2009Wen and Li, 2012;Juan and Zou, 2013;Chaturvedi et al, 2013;Zhang et al, 2014;Leu and Hsieh, 2014;Ramesh and Bhaskaran, 2014;Karuppiah and Saravanan, 2014;Kumari and Om, 2015;Lee et al, 2013), some researchers have developed the remote login schemes using geometric approach, which was first discussed by Wu (1995) with simple implementation in the Euclidean plane. The Wu's scheme was modified by Chien et al (2001) in 2001 proposed a scheme using a circle in n-dimensional space.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary requirement for these kinds of scenarios is to authenticate the remote user, whether a valid smart card holder is having the rights and privileges to access the server resources. To solve this problem lots of researchers proposed remote user authentication schemes with smartcards [1][2][3][4][5][6][7][11][12][13][14][15][16][17][18][19] to authenticate a legitimate user, but none of them can address all possible security problems and with-stand all possible attacks [1,[3][4][5]9,[14][15][16][17][18][19]21]. In addition most of the schemes proposed [13,17,18] do not preserve user anonymity.…”
Section: Introductionmentioning
confidence: 99%
“…The authentication schemes are primarily used for authorized communication between the targeted server and remote user [4][5][6][7]. In general, authentication schemes support mutual authentication and session key agreement, where involve entities can verifies the correctness of each other and draw a common key with shared secrets such that only the authorized participants can construct [8,9]. The established key is called session key, which can be used to transmit confidential data [10,11].…”
Section: Introductionmentioning
confidence: 99%