ACM Transactions on Computer Systems (TOCS)
Password authentication with insecure communication
Communications of the ACM
A Flexible User Authentication Scheme for Multi-server Internet Services
ICN '01 Proceedings of the First International Conference on Networking-Part 1
ID-based password authentication scheme using smart cards and fingerprints
ACM SIGOPS Operating Systems Review
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers
The Computer Journal
A neural network system for authenticating remote users in multi-server architecture
International Journal of Communication Systems
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Computer Standards & Interfaces
User authentication scheme with privacy-preservation for multi-server environment
IEEE Communications Letters
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Efficient multi-server password authenticated key agreement using smart cards
IEEE Transactions on Consumer Electronics
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for improving these drawbacks is proposed in this paper. The proposed scheme has the following benefits: (1) it complies with all the requirements for multi-server environments; (2) it can withstand all the well-known attacks at the present time; (3) it is equipped with a more secure key agreement procedure; and (4) it is quite efficient in terms of the cost of computation and transmission. In addition, the analysis and comparisons show that the proposed scheme outperforms the other related schemes in various aspects.