Open Access
(IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Network
Reads0
Chats0
About:
The article was published on 2001-01-01 and is currently open access. It has received 76 citations till now. The article focuses on the topics: S/KEY & Authentication protocol.read more
Citations
More filters
Journal ArticleDOI
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao,Shuenn-Shyang Wang +1 more
TL;DR: The proposed scheme only uses hashing functions to implement a robust authentication scheme for the multi-server environment and provides a secure method to update password without the help of third trusted party.
Posted Content
Community Detection in Complex Networks Using Genetic Algorithms
TL;DR: The em-ployment of a genetic algorithm to detect communities in complex networks which is based on optimizing network modularity is presented, which does not need any prior knowledge about the number of commu-nities.
Journal ArticleDOI
Efficient multi-server password authenticated key agreement using smart cards
TL;DR: A novel user authentication and key agreement scheme using smart cards for multi-server environments with much less computational cost and more functionality, which is a nonce-bayed scheme which does not have a serious time-synchronization problem.
Journal ArticleDOI
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
Journal ArticleDOI
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Eun-Jun Yoon,Kee-Young Yoo +1 more
TL;DR: This paper proposes a new efficient and secure biometrics-based multi- server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments.
References
More filters
Journal ArticleDOI
A secure dynamic ID based remote user authentication scheme for multi-server environment
Yi-Pin Liao,Shuenn-Shyang Wang +1 more
TL;DR: The proposed scheme only uses hashing functions to implement a robust authentication scheme for the multi-server environment and provides a secure method to update password without the help of third trusted party.
Posted Content
Community Detection in Complex Networks Using Genetic Algorithms
TL;DR: The em-ployment of a genetic algorithm to detect communities in complex networks which is based on optimizing network modularity is presented, which does not need any prior knowledge about the number of commu-nities.
Journal ArticleDOI
Efficient multi-server password authenticated key agreement using smart cards
TL;DR: A novel user authentication and key agreement scheme using smart cards for multi-server environments with much less computational cost and more functionality, which is a nonce-bayed scheme which does not have a serious time-synchronization problem.
Journal ArticleDOI
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
Journal ArticleDOI
Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem
Eun-Jun Yoon,Kee-Young Yoo +1 more
TL;DR: This paper proposes a new efficient and secure biometrics-based multi- server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem (ECC) without verification table to minimize the complexity of hash operation among all users and fit multi-server communication environments.