Two-factor authentication schemes based smart card and password with user anonymity

被引:0
|
作者
Cao, Tianjie [1 ]
Huang, Shi [1 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China
来源
关键词
D O I
10.12733/jcis8346
中图分类号
学科分类号
摘要
引用
收藏
页码:8831 / 8838
相关论文
共 50 条
  • [21] Smart Card Based Remote User Authentication Schemes - Survey
    Katherine, G. Jaspher W.
    Kirubakaran, E.
    Prakash, Parul
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [22] An Efficient and Secure Two-Factor Password Authentication Scheme With Card Reader(Terminal) Verification
    Xiong, Wanjun
    Zhou, Fan
    Wang, Ruomei
    Lan, Rushi
    Sun, Xiyan
    Luo, Xiaonan
    IEEE ACCESS, 2018, 6 : 70707 - 70719
  • [23] Two-factor face authentication using matrix permutation transformation and a user password
    Kang, Jeonil
    Nyang, DaeHun
    Lee, KyungHee
    INFORMATION SCIENCES, 2014, 269 : 1 - 20
  • [24] A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card
    Ziauddin, Sheikh
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 209 - 216
  • [25] Design of a lightweight two-factor authentication scheme with smart card revocation
    Mishra, Dheerendra
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 44 - 53
  • [26] Improve two remote user authentication schemes using smart card
    Chen, Chin-Ling
    Tasi, Wei-Chen
    Leu, Fang-Yie
    2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013), 2013, : 404 - 407
  • [27] Robust smart-card-based remote user password authentication scheme
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) : 377 - 389
  • [28] Weakness and Improvement of the Smart Card Based Remote User Authentication Scheme with Anonymity
    Lee, Yung-Cheng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (06) : 1121 - 1134
  • [29] A Survey on Two-Factor User Authentication Schemes in Wireless Sensor Networks
    Kaur, Sharanjeet
    Khandnor, P.
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1077 - 1081
  • [30] On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
    Wang, Ding
    Wang, Ping
    COMPUTER NETWORKS, 2014, 73 : 41 - 57