Filters








11,346 Hits in 4.6 sec

An Anonymous Authentication Scheme for Identification Card [chapter]

He Ge
2006 Lecture Notes in Computer Science  
We proposed an efficient anonymous authentication scheme for this anonymous identification card, with the support of rogue card revocation.  ...  This paper presents the concept of anonymous identification card, a technique enabling a card holder to demonstrates his/her authenticity without disclosing real identity.  ...  these two integers; (2) based on the result in (1), we devised a lightweight anonymous authentication scheme for anonymous identification card.  ... 
doi:10.1007/11935308_17 fatcat:ysusrcseqnauddi2zuiouptxkq

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

Younsung Choi, Junghyun Nam, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho Won
2014 The Scientific World Journal  
To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics.  ...  An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner  ...  Introduction In Chuang and Chens paper, they propose an anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards, password, and biometrics. they say that proposed  ... 
doi:10.1155/2014/281305 pmid:25276847 pmcid:PMC4170879 fatcat:tda3lwllm5e27j4neiicg6p45a

On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud [chapter]

Bernd Zwattendorfer, Daniel Slamanig
2013 IFIP Advances in Information and Communication Technology  
To facilitate the adoption of this eID system at online applications, the open source module MOA-ID has been developed, which manages identification and authentication based on the Austrian citizen card  ...  Secure authentication and unique identification of Austrian citizens are the main functions of the Austrian eID system.  ...  We would like to thank the anonymous reviewers for their valuable suggestions.  ... 
doi:10.1007/978-3-642-39218-4_23 fatcat:adgf6cmsrrd3hk6bgizqvgsoo4

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction

Younsung Choi, Youngsook Lee, Dongho Won
2016 International Journal of Distributed Sensor Networks  
Finally, we conduct a security analysis for the proposed biometrics-based user authentication scheme.  ...  The latter then proposed an advanced biometricsbased user authentication scheme; in this paper, we analyze this advanced scheme and perform a cryptanalysis.  ...  The former then proposed an advanced biometrics-based user authentication scheme for WSNs.  ... 
doi:10.1155/2016/8572410 fatcat:crmf3ofprbc2vfnyjfk5r3ly5y

Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Zhibo Wang
2013 Mathematical Problems in Engineering  
We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme.  ...  This paper aims at improving security and providing more excellent performances for remote user authentication scheme.  ...  Acknowledgments The authors are grateful to the editor and anonymous reviewers for their valuable suggestions which improved the paper.  ... 
doi:10.1155/2013/910409 fatcat:rq3ncrxl6rg6nhdlvml6hm7xke

A Privacy-Preserving Roaming Authentication Scheme for Ubiquitous Networks

You-sheng Zhou, Jun-feng Zhou, Feng Wang
2016 International Journal of Advanced Computer Science and Applications  
A privacy-preserving roaming authentication scheme (PPRAS) for ubiquitous networks is proposed, in which a remote mobile user can obtain the service offered by a foreign agent after being authenticated  ...  In order to protect the mobile user's privacy, the user presents an anonymous identity to the foreign agent with the assistance of his or her home agent to complete the authentication.  ...  scheme for authentication.  ... 
doi:10.14569/ijacsa.2016.070163 fatcat:gyuw4xqbsncolpcmui6e575bhy

Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors

Ali Yassin, Jian Yao, Shiyao Han
2016 Computers  
Currently, Chun-Ta et al. [21] presented an improved scheme of Khan et al. [22] that fails to preserve user's anonymity.  ...  There are several authentication schemes that are proposed in [8] [9] [10] [11] [12] [13] to use the smart card as a second authentication factor.  ...  s scheme, and present the main challenges in designing an authentication scheme with user anonymity.  ... 
doi:10.3390/computers5030015 fatcat:gz3vxubxrjc6zhord6cuw6nmde

Multidevice Authentication with Strong Privacy Protection

Jan Hajny, Petr Dzurenda, Lukas Malina
2018 Wireless Communications and Mobile Computing  
Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices.  ...  Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels.  ...  For the research, infrastructure of the SIX Center was used.  ... 
doi:10.1155/2018/3295148 fatcat:vydnvw6iubcxrja65fnf2nhiiu

A Remote User Authentication Scheme with Anonymity for Mobile Devices

Soobok Shin, Kangseok Kim, Ki-Hyung Kim, Hongjin Yeh
2012 International Journal of Advanced Robotic Systems  
In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user.  ...  The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions.  ...  Proposed Authentication Scheme In this section, we propose an enhanced security scheme for mutual authentication and user anonymity using a smart card.  ... 
doi:10.5772/50912 fatcat:xhxllds3jngedkruq5a5cbqwkm

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity

Dongwoo Kang, Jaewook Jung, Hyoungshick Kim, Youngsook Lee, Dongho Won
2018 Security and Communication Networks  
Recently, Kaul and Awasthi presented an user authentication and key agreement scheme, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties.  ...  Second, user anonymity rule cannot be upheld. Third, session key can be compromised by an attacker. Fourth, there is high possibility that the time synchronization trouble occurs.  ...  Therefore, user anonymity is must be taken seriously as a satisfied property for user authentication scheme.  ... 
doi:10.1155/2018/9046064 fatcat:lgkcmn6lyba67k3cyna4z5xyqi

Security vulnerabilities of an enhanced remote user authentication scheme

Hae-Soon Ahn, Eun-Jun Yoon
2014 Contemporary Engineerng Sciences  
In 2014, Yang et al. proposed a new dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks.  ...  s scheme and then shows that the scheme not only is still vulnerable to off-line password guessing attack, but also does not provide the unlinkability property and user anonymity because of the identity  ...  anonymous user identification [5] .  ... 
doi:10.12988/ces.2014.49186 fatcat:w3ayqeac4vcx3j7whhw2e4f5ai

An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

Yousheng Zhou, Junfeng Zhou, Feng Wang, Feng Guo
2016 Applied Computational Intelligence and Soft Computing  
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted  ...  Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.  ...  Although the scheme in [20] can uncover the real identification for the outside attacker, the authenticated peers can know the real identification of each other, so that it lacks the strong anonymity  ... 
doi:10.1155/2016/3916942 fatcat:bqkshrtqrng5hoo35r44tc6cvm

Readiness of Anonymous Credentials for Real Environment Deployment

Raúl Casanova-Marqués, Petr Dzurenda
2022 Zenodo  
ACKNOWLEDGMENT The authors gratefully acknowledge funding from European Union's Horizon 2020 Research and Innovation programme under the Marie Skłodowska Curie grant agreement No. 813278 (A-WEAR: A network for  ...  The authors of [2] designed and implemented an attribute-based authentication system for standard smart cards.  ...  These schemes permit anonymous authentication of users without disclosing their personal data such as their name, age, or nationality.  ... 
doi:10.5281/zenodo.6623793 fatcat:s4y3h5yzzvghlfmesxa3bnv5na

A Survey on Single Sign-On Mechanisms for Distributed Computer Networks
English

N Gomathy, Dr.N Radha
2014 International Journal of Computer Trends and Technology  
In the distributed computer networks, user verification is an important process for the security.  ...  In this survey, different mechanisms are suggested for providing the anonymity of legal users.  ...  Wen-Shenq Juang et.al [5] presented a method which is named as robust and efficient user authentication and key agreement scheme using smart cards.  ... 
doi:10.14445/22312803/ijctt-v13p125 fatcat:ogiibyxpqzdtlcf7m7fnpntcgi

Efficient Anonym Smart Card Based Authentication Scheme for Multi-Server Architecture

An Braeken
2015 International Journal of Smart Home  
Next, we propose a very efficient smart card based authentication scheme, solely using xor and hash operations, which is resistant against dishonest users and servers.  ...  Smart card based approaches lead to more secure systems because they offer two-factor authentication, based on the strict combination of user's password and the possession of the smart card.  ...  Conclusions In this paper, after showing a weakness in an existing system, we propose a new very efficient scheme for smart card based authentication on multi-server architecture.  ... 
doi:10.14257/ijsh.2015.9.9.19 fatcat:xodbly5rgba57dwhwoiezek3mq
« Previous Showing results 1 — 15 out of 11,346 results