At present, a number of users employ an authentication protocol so as to enjoy protected electronic transactions in wireless networks. In order to establish an efficient and robust the transaction system, numerous researches have been conducted relating to authentication protocols. Recently, Kaul and Awasthi presented an user authentication and key agreement scheme, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent two kinds of attacks, including off-line password guessing attacks and user impersonation attacks. Second, user anonymity rule cannot be upheld. Third, session key can be compromis...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Abstract: User authentication is the first and probably the most challenging step in achieving secu...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
With the rapid development of personal information and wireless communication technology, user authe...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
In multi-server environments, user authentication is a very important issue because it provides the ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Abstract: User authentication is the first and probably the most challenging step in achieving secu...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
A secure key agreement scheme plays a major role in protecting communications between the users usin...
With the rapid development of personal information and wireless communication technology, user authe...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
In multi-server environments, user authentication is a very important issue because it provides the ...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Abstract: User authentication is the first and probably the most challenging step in achieving secu...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...