2018
DOI: 10.1155/2018/9178941
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

Abstract: The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 53 publications
0
21
0
Order By: Relevance
“…Recently, many smart card authentication protocols based on the password were proposed [42][43][44]. Most of these protocols are still vulnerable to ID-theft attack, offline password guessing attacks, undetectable online password guessing attacks, and user impersonation attack.…”
Section: Smart Card With Password Based Methodsmentioning
confidence: 99%
“…Recently, many smart card authentication protocols based on the password were proposed [42][43][44]. Most of these protocols are still vulnerable to ID-theft attack, offline password guessing attacks, undetectable online password guessing attacks, and user impersonation attack.…”
Section: Smart Card With Password Based Methodsmentioning
confidence: 99%
“…The methodology of calculating the computational time is the same as discussed in Subsection 4.1. The smart card protocols [106][107][108][109] are based on modular exponentiations whereas protocol [105] and [110][111][112] The cost of other operations has been ignored in this analysis as the time taken by them is reasonably small in comparison to modular exponentiation and elliptic curve point multiplication. Computational cost of the smart card protocols has been publicized in Table 14 (p is the number of elliptic curve point multiplications;…”
Section: Recent Security Protocols For Smart Cardsmentioning
confidence: 99%
“…3 presents the graphical analysis of computational of different smart card security protocols. [110] 3 0 3 0 6 0 7.503 7.503 15.006 Xie et al [105] 3 0 3 0 6 0 7.503 7.503 15.006 T r u o n g et al [111] 2 0 2 0 4 0 5.002 5.002 10.004 Z h a o, L i and J i a n g [112] 2 0 2 0 4 0 5.002 5.002 10.004…”
Section: Recent Security Protocols For Smart Cardsmentioning
confidence: 99%
See 1 more Smart Citation
“…An information system improves usability, maintainability, and security through standardization and development of best practices [3,4]. Authentication is the main gateway in an information system to get authorization to access the account [5]. The authentication process is a user validation process in a smart card, biometric, or username-password [6,7].…”
Section: Introductionmentioning
confidence: 99%