4.2 Article

An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Engineering, Electrical & Electronic

Universally composable three-party password-authenticated key exchange with contributiveness

Xuexian Hu et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)

Article Computer Science, Information Systems

A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

Vanga Odelu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

Santanu Chatterjee et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Hardware & Architecture

Provably secure three-party authenticated key agreement protocol using smart cards

Haomin Yang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

A Survey of SIP Authentication and Key Agreement Schemes

H. Hakan Kilinc et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Theory & Methods

A Novel Serial Multimodal Biometrics Framework Based on Semisupervised Learning Techniques

Qing Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Theory & Methods

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems

Xinyi Huang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy

Vanga Odelu et al.

INFORMATION SCIENCES (2014)

Review Computer Science, Information Systems

A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing

Muhammad Shiraz et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

Privacy-Preserving Speech Processing

Manas A. Pathak et al.

IEEE SIGNAL PROCESSING MAGAZINE (2013)

Article Computer Science, Information Systems

Provably secure three party encrypted key exchange scheme with explicit authentication

Hao-Chuan Tsai et al.

INFORMATION SCIENCES (2013)

Article Computer Science, Hardware & Architecture

An novel three-party authenticated key exchange protocol using one-time key

Chao Lv et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

New identity-based three-party authenticated key agreement protocol with provable security

Hu Xiong et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol

Raylin Tso

JOURNAL OF SUPERCOMPUTING (2013)

Article Computer Science, Interdisciplinary Applications

Re-attack on a three-party password-based authenticated key exchange protocol

Haiquan Liang et al.

MATHEMATICAL AND COMPUTER MODELLING (2013)

Article Computer Science, Information Systems

A communication and computation-efficient three-party authenticated key agreement protocol

Zuowen Tan

SECURITY AND COMMUNICATION NETWORKS (2013)

Article Computer Science, Information Systems

Secure verifier-based three-party password-authenticated key exchange

Qiong Pu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2013)

Article Computer Science, Hardware & Architecture

Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities

Ernie Brickell et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)

Article Computer Science, Theory & Methods

A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems

Koen Simoens et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Information Systems

Provably secure three-party password-based authenticated key exchange protocol

Jianjie Zhao et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

Shuhua Wu et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

A round-optimal three-party ID-based authenticated key agreement protocol

Kyung-Ah Shim

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings

Zijian Zhang et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Information Systems

Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem

Ashok Kumar Das et al.

INFORMATION SCIENCES (2012)

Article Engineering, Electrical & Electronic

Cryptanalysis of an efficient three-party password-based key exchange scheme

Marcos A. Simplicio et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Computer Science, Software Engineering

Provably secure three-party password authenticated key exchange protocol in the standard model

Jun-Han Yang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2012)

Article Computer Science, Information Systems

Robust smart-cards-based user authentication scheme with user anonymity

Shuhua Wu et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Computer Science, Information Systems

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

Lei Zhang et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Information Systems

A communication-efficient three-party password authenticated key exchange protocol

Ting-Yi Chang et al.

INFORMATION SCIENCES (2011)

Article Engineering, Electrical & Electronic

Efficient three-party password-based key exchange scheme

Der-Chyuan Lou et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)

Article Engineering, Electrical & Electronic

On a simple three-party password-based key exchange protocol'

Ching-Ying Lin et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)

Article Engineering, Electrical & Electronic

Cryptanalysis of a simple three-party password-based key exchange protocol

Eun-Jun Yoon et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Information Systems

A Simple and Generic Construction of Authenticated Encryption with Associated Data

Palash Sarkar

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2010)

Article Computer Science, Theory & Methods

A Hybrid Approach for Generating Secure and Discriminating Face Template

Yi C. Feng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Theory & Methods

Soft Biometric Traits for Continuous User Authentication

Koichiro Niinuma et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Computer Science, Information Systems

Simple password-based three-party authenticated key exchange without server public keys

Tian-Fu Lee et al.

INFORMATION SCIENCES (2010)

Article Computer Science, Artificial Intelligence

A hybrid biometric cryptosystem for securing fingerprint minutiae templates

Abhishek Nagar et al.

PATTERN RECOGNITION LETTERS (2010)

Article Engineering, Electrical & Electronic

A simple three-party password-based key exchange protocol

Hui-Feng Huang

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2009)

Article Computer Science, Information Systems

Cryptanalysis of simple three-party key exchange protocol

Hua Guo et al.

COMPUTERS & SECURITY (2008)

Article Computer Science, Information Systems

Provably secure constant round contributory group key agreement in dynamic setting

Ratna Dutta et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)

Article Computer Science, Information Systems

Three weaknesses in a simple three-party key exchange protocol

Hao-Rung Chung et al.

INFORMATION SCIENCES (2008)

Article Computer Science, Information Systems

Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)

Raphael C. -W. Phan et al.

INFORMATION SCIENCES (2008)

Review Engineering, Electrical & Electronic

Biometric template security

Anil K. Jain et al.

EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2008)

Article Computer Science, Information Systems

Simple three-party key exchange protocol

Rongxing Lu et al.

COMPUTERS & SECURITY (2007)

Article Computer Science, Theory & Methods

Some observations on the theory of cryptographic hash functions

DR Stinson

DESIGNS CODES AND CRYPTOGRAPHY (2006)

Article Engineering, Electrical & Electronic

Efficient three-party key exchange using smart cards

WS Jaung

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2004)

Article Computer Science, Hardware & Architecture

The advantages of elliptic curve cryptography for wireless security

K Lauter

IEEE WIRELESS COMMUNICATIONS (2004)

Article Computer Science, Information Systems

Enhanced three-party encrypted key exchange without server public keys

TF Lee et al.

COMPUTERS & SECURITY (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)

Article Telecommunications

Three-party encrypted key exchange without server public-keys

CL Lin et al.

IEEE COMMUNICATIONS LETTERS (2001)

Article Computer Science, Information Systems

Enhancing security and privacy in biometrics-based authentication systems

NK Ratha et al.

IBM SYSTEMS JOURNAL (2001)

Article Computer Science, Hardware & Architecture

Biometric identification

A Jain et al.

COMMUNICATIONS OF THE ACM (2000)