Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to various servers using single identity and password. We introduce a new authentication scheme for multi-server environments using Chebyshev chaotic map. In our scheme, we use the Chebyshev chaotic map and biometric verification along with password verification for authorization and access to various application servers. The proposed scheme is light-weight compared to other related schemes. We only use the Chebyshev chaotic map, cryptographic hash function and symmetric key encryption-...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak passwo...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
The authentication scheme is an important cryptographic mechanism, through which two communication p...
In multi-server environments, user authentication is a very important issue because it provides the ...
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentic...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
Nowadays, communication technologies are more and more strongly advanced, such as 4G or 5G. There ar...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
With nonstop development of communication technologies, all aspects of social life continuously chan...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak passwo...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
The authentication scheme is an important cryptographic mechanism, through which two communication p...
In multi-server environments, user authentication is a very important issue because it provides the ...
Secure and efficient authentication protocols are necessary for cloud service. Multifactor authentic...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
Nowadays, communication technologies are more and more strongly advanced, such as 4G or 5G. There ar...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
With nonstop development of communication technologies, all aspects of social life continuously chan...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak passwo...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Biometric data offer a potential source of high-entropy, secret information that can be used in cryp...