An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography

被引:0
|
作者
Hwang, Min-Shiang [1 ,2 ,4 ]
Li, Hou-Wen [3 ]
Yang, Cheng-Ying [5 ]
机构
[1] Department of Computer Science & Information Engineering, Asia University, Taiwan
[2] Fintech and Blockchain Research Center, Asia University, Taiwan
[3] The Ph.D. Program in Artificial Intelligence, Asia University, Taiwan 500, Lioufeng Rd., Wufeng, Taichung, Taichung,41354, Taiwan
[4] Department of Medical Research, China Medical University Hospital, China Medical University, Taichung,40402, Taiwan
[5] Department of Computer Science, University of Taipei, Taipei, Taiwan
关键词
Compendex;
D O I
10.6633/IJNS.202407 26(4).20
中图分类号
学科分类号
摘要
Architecture - Authentication - Denial-of-service attack - Geometry - Network architecture - Public key cryptography
引用
收藏
页码:713 / 718
相关论文
共 50 条
  • [31] On the security of an authentication scheme for multi-server architecture
    He, Debiao
    Chen, Jianhua
    Shi, Wenbo
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 288 - 296
  • [32] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [33] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [34] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [35] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [36] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [37] Cryptanalysis and improvement of a smart card based authentication scheme for multi-server architecture using ECC
    Wan, Tao
    Liu, Xiaochang
    Liao, Weichuan
    Jiang, Nan
    International Journal of Network Security, 2019, 21 (06) : 993 - 1002
  • [38] Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
    Yoon, Eun-Jun
    Yoo, Kee-Young
    JOURNAL OF SUPERCOMPUTING, 2013, 63 (01): : 235 - 255
  • [39] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [40] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67