Abstract In a multi-server authentication environment, a user only needs to register once at a central registration place before accessing the different services on the different registered servers. Both, from a user point of view as for the management and maintenance of the infrastructure, these types of environments become more and more popular. Smartcard- or smartphone-based approaches lead to more secure systems because they offer two- or three-factor authentication, based on the strict combination of the user’s password, the user’s biometrics and the possession of the device. In this paper, we propose an efficient anonymous authentication protocol in multiple server communication networks, called the EAAM protocol, which is able to est...
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentic...
Most of the password based authentication protocols make use of the single authentication server for...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
[[abstract]]In a multi-server environment, remote user authentication is essential for secure commun...
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric a...
[[abstract]]This paper proposes an efficient password authenticated key agreement protocol for multi...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentic...
Most of the password based authentication protocols make use of the single authentication server for...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
[[abstract]]An efficient and practical authenticated key agreement protocol based on the line of geo...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
[[abstract]]In a multi-server environment, remote user authentication is essential for secure commun...
An anonymous authentication and key agreement (AAKA) protocol provides anonymous members symmetric a...
[[abstract]]This paper proposes an efficient password authenticated key agreement protocol for multi...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentic...
Most of the password based authentication protocols make use of the single authentication server for...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...