Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockch...
Many remote user authentication schemes have been designed and developed to establish secure and aut...
The conventional Automated Teller Machines in Nigeria have over the past few years been faced with i...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
With the rapid development of personal information and wireless communication technology, user authe...
Authentication is required in stored database systems so that only authorized users can access the d...
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to acces...
Three-factor authentication method was introduced as advancement to two-factor authentication scheme...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive inf...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
A secure network depends in part on user authentication and regrettably the authentication systems c...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Many remote user authentication schemes have been designed and developed to establish secure and aut...
The conventional Automated Teller Machines in Nigeria have over the past few years been faced with i...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
With the rapid development of personal information and wireless communication technology, user authe...
Authentication is required in stored database systems so that only authorized users can access the d...
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to acces...
Three-factor authentication method was introduced as advancement to two-factor authentication scheme...
Authentication is a process of verifying the credibility of a user who is trying to access classifie...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive inf...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
A secure network depends in part on user authentication and regrettably the authentication systems c...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or someth...
Many remote user authentication schemes have been designed and developed to establish secure and aut...
The conventional Automated Teller Machines in Nigeria have over the past few years been faced with i...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...