A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
“Paramita wisdom” password authentication scheme without verification tables
Journal of Systems and Software
Password authentication with insecure communication
Communications of the ACM
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
Improving the Security of Non-PKI Methods for Public Key Distribution
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Journal of Network and Computer Applications
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Improvement of Li-Hwang's biometrics-based remote user authentication scheme using smart cards
WSEAS TRANSACTIONS on COMMUNICATIONS
Journal of Network and Computer Applications
On the security enhancement of an efficient and secure event signature protocol for p2p MMOGs
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part I
Information Sciences: an International Journal
Recursive hiding of biometrics-based secret sharing scheme using adversary structure
Information Processing Letters
Security analysis of a multi-factor authenticated key exchange protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Expert Systems with Applications: An International Journal
Journal of Medical Systems
Journal of Intelligent Manufacturing
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
In this paper, we propose an efficient biometric-based remote user authentication scheme using smart cards, in which the computation cost is relatively low compared with other related schemes. The security of the proposed scheme is based on the one-way hash function, biometrics verification and smart card. Moreover, the proposed scheme enables the user to change their passwords freely and provides mutual authentication between the users and the remote server. In addition, many remote authentication schemes use timestamps to resist replay attacks. Therefore, synchronized clock is required between the user and the remote server. In our scheme, it does not require synchronized clocks between two entities because we use random numbers in place of timestamps.