Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme....
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
The authentication scheme is an important cryptographic mechanism, through which two communication p...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
In multi-server environments, user authentication is a very important issue because it provides the ...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
[[abstract]]Two user authentication schemes for multi-server environments have been proposed by Tsai...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
With the rapid development of personal information and wireless communication technology, user authe...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
The authentication scheme is an important cryptographic mechanism, through which two communication p...
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server env...
In multi-server environments, user authentication is a very important issue because it provides the ...
In order to improve the security in remote authentication systems, numerous biometric-based authenti...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
With the security requirements of networks, biometrics authenticated schemes which are applied in th...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
[[abstract]]Two user authentication schemes for multi-server environments have been proposed by Tsai...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
With the rapid development of personal information and wireless communication technology, user authe...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
AbstractSeveral biometric-based remote user authentication schemes using smart cards have been propo...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
[[abstract]]In single-server architecture, one service is maintained by one server. If a user wants ...
The authentication scheme is an important cryptographic mechanism, through which two communication p...