A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography

The session initiation protocol (SIP) is a powerful signaling protocol that controls communication on the Internet, establishing, maintaining, and terminating the sessions. The services that are enabled by SIP are equally applicable in the world of mobile and ubiquitous computing. In 2009, Tsai proposed an authenticated key agreement scheme as an enhancement to SIP. Very recently, Arshad et al....

متن کامل

Elliptic Curve Cryptography Based Wireless Authentication Protocol

Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...

متن کامل

A Modified Signcryption Scheme using Elliptic Curve Cryptography

In this paper, an efficient signcryption scheme based on elliptic curve cryptosystem is going to be proposed which can effectively combine the functionalities of digital signature and encryption and also takes a comparable amount of computational cost and communication overhead. The proposed scheme provides confidentiality, integrity, unforgeability and nonrepudiation, along with encrypted mess...

متن کامل

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is ...

متن کامل

An efficient authentication scheme for contactless smartcards using elliptic curve cryptography

Nowadays the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional, is a very important issue that concerns the information society. The scope of this paper is to develop a Contactless Smartcard protocol, which will be able operate securely and effectively, under a variety of attack methods. The system implements a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2018

ISSN: 1424-8220

DOI: 10.3390/s18072394