The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.3934/amc.2020103
|View full text |Cite
|
Sign up to set email alerts
|

RETRACTION: Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption

Abstract: The major need of remote user authentication is to verify the authenticity of the user through insecure channel. Till today enormous remote user authentication schemes have been proposed but still some security flaws remains. Some of them are vulnerable to password guessing attack, Id guessing attack, client and server impersonation attack, replay attack, Denial of Service (DoS) attack etc. Besides the security issues many such schemes are supposed to have higher computational and communicational cost. To over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The speed analysis of our system was compared with existing systems and shown to have a 5% improvement in speed. All these analyses make the DPLM-PRNG more suitable for cryptographic applications like in bio-hash [29], remote-user authentication [30], steganography, encryption [31,32], etc.…”
Section: Discussionmentioning
confidence: 99%
“…The speed analysis of our system was compared with existing systems and shown to have a 5% improvement in speed. All these analyses make the DPLM-PRNG more suitable for cryptographic applications like in bio-hash [29], remote-user authentication [30], steganography, encryption [31,32], etc.…”
Section: Discussionmentioning
confidence: 99%
“…To achieve this proposed protocol is mainly designed to transmit data and information sensor nodes and varied wireless network nodes in emergency and disaster conditions. In this approach, every node connects to a sensor network based on spatial clusters and shares information on certain cluster nodes, or forwards data to each node whenever a node with such a high likelihood of data being sent to the destination is sometimes encountered [24].…”
Section: Discussionmentioning
confidence: 99%