4.7 Article

An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation

Related references

Note: Only part of the references are listed.
Article Health Care Sciences & Services

Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System

Zeeshan Siddiqui et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Automation & Control Systems

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

Guilin Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Article Computer Science, Theory & Methods

Privacy Preserving Data Sharing With Anonymous ID Assignment

Larry A. Dunning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Computer Science, Hardware & Architecture

Satisfying Privacy Requirements Before Data Anonymization

Xiaoxun Sun et al.

COMPUTER JOURNAL (2012)

Article Computer Science, Information Systems

A strong user authentication scheme with smart cards for wireless communications

Daojing He et al.

COMPUTER COMMUNICATIONS (2011)

Article Computer Science, Software Engineering

A generic framework for constructing cross-realm C2C-PAKA protocols based on the smart card

Jing Xu et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2011)

Article Computer Science, Theory & Methods

A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems

Xinyi Huang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Computer Science, Hardware & Architecture

An improved smart card based password authentication scheme with provable security

Jing Xu et al.

COMPUTER STANDARDS & INTERFACES (2009)

Article Computer Science, Theory & Methods

Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics

Chun-I Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Theory & Methods

Template-free biometric-key generation by means of fuzzy genetic clustering

Weiguo Sheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Hardware & Architecture

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)

Article Computer Science, Artificial Intelligence

Combining minutiae descriptors for fingerprint matching

Jianjiang Feng

PATTERN RECOGNITION (2008)

Article Computer Science, Theory & Methods

Fingerprint-based fuzzy vault: Implementation and performance

Karthik Nandakumar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)

Article Computer Science, Theory & Methods

Biometrics: A tool for information security

Anil K. Jain et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2006)

Article Mathematics, Applied

An improvement of the Yang-Shieh password authentication schemes

CC Yang et al.

APPLIED MATHEMATICS AND COMPUTATION (2005)

Article Engineering, Electrical & Electronic

Biometric cryptosystems: Issues and challenges

U Uludag et al.

PROCEEDINGS OF THE IEEE (2004)

Article Computer Science, Information Systems

Security enhancement for the timestamp-based password authentication scheme using smart cards

JJ Shen et al.

COMPUTERS & SECURITY (2003)

Article Computer Science, Information Systems

An enhancement of timestamp-based password authentication scheme

L Fan et al.

COMPUTERS & SECURITY (2002)