Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentication protocols taking advantage of smart card, user’s password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, most of the multiserver authentication protocols may have weak points, such as smart card loss attack, man-in-the-middle attack, anonymity, and high computation cost of authentication center. In order to overcome the above weaknesses, we propose a novel multiserver multifactor authentication protocol based on the Kerberos protocol using the extended Chebyshev chaotic mapping as a cryptographic algorithm. The proposed protocol achieves anonymity wi...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
more request to IT Technology for Cloud computing. And effective use request of computer resource is...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been wi...
Most of the password based authentication protocols make use of the single authentication server for...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Three-factor multiserver authentication protocols become a prevalence in recent years. Among these p...
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a mul...
In a typical single-server architecture, when a user wishes to access multiple servers to obtain dif...
A multiserver environment can improve the efficiency of mobile network services more effectively tha...
With the great development of network technology, the multiserver system gets widely used in providi...
Because the authentication method based on username-password has the disadvantage of easy disclosure...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
more request to IT Technology for Cloud computing. And effective use request of computer resource is...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
With the development of Internet of Things (IoT) technologies, Internet-enabled devices have been wi...
Most of the password based authentication protocols make use of the single authentication server for...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Three-factor multiserver authentication protocols become a prevalence in recent years. Among these p...
Since Kerberos suffers from KDC (Key Distribution Center) compromise and impersonation attack, a mul...
In a typical single-server architecture, when a user wishes to access multiple servers to obtain dif...
A multiserver environment can improve the efficiency of mobile network services more effectively tha...
With the great development of network technology, the multiserver system gets widely used in providi...
Because the authentication method based on username-password has the disadvantage of easy disclosure...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
more request to IT Technology for Cloud computing. And effective use request of computer resource is...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...