With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the...
With the rapid development of personal information and wireless communication technology, user authe...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...
Abstract—A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is propo...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Designing a secure and efficient anonymous authentication protocol for roaming services in global mo...
Many novel, effective, and efficient applications and networking services are being developed for th...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]User authentication is an important security mechanism for recognizing legal roaming use...
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services th...
Smart mobile phones are widely popularized and advanced mobile communication services are provided i...
Many remote user authentication schemes have been designed and developed to establish secure and aut...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
With the rapid development of personal information and wireless communication technology, user authe...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...
Abstract—A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is propo...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
Designing a secure and efficient anonymous authentication protocol for roaming services in global mo...
Many novel, effective, and efficient applications and networking services are being developed for th...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]User authentication is an important security mechanism for recognizing legal roaming use...
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services th...
Smart mobile phones are widely popularized and advanced mobile communication services are provided i...
Many remote user authentication schemes have been designed and developed to establish secure and aut...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
With the rapid development of personal information and wireless communication technology, user authe...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The autho...