2012
DOI: 10.1007/s11071-012-0652-3
|View full text |Cite
|
Sign up to set email alerts
|

A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
55
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 86 publications
(55 citation statements)
references
References 28 publications
0
55
0
Order By: Relevance
“…But, the researchers have considered biometric feature [2] with the password to enhance the security label. Therefore, many researchers have proposed biometric and password based authentication schemes in [17][18][19][20][21][22][23][24][25][26][27][28]. Li and Hwang [17] proposed a biometrics-based remote user authentication scheme in 2010.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…But, the researchers have considered biometric feature [2] with the password to enhance the security label. Therefore, many researchers have proposed biometric and password based authentication schemes in [17][18][19][20][21][22][23][24][25][26][27][28]. Li and Hwang [17] proposed a biometrics-based remote user authentication scheme in 2010.…”
Section: Literature Surveymentioning
confidence: 99%
“…Li et al [20] found that An's scheme [19] suffered from the denial-of-service (DoS) attack, the forgery attack and also did not provide forward secrecy. Furthermore, in 2013, Lee and Hsu [21] pointed out that Das's scheme [18] is also suffering from privileged insider attack and the off-line password guessing attack. Therefore, Lee and Hsu [21] proposed a biometric based authentication scheme to overcome the weaknesses of Das's scheme [18].…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we first introduce the definitions and related char acteristics of chaotic maps [9,10]. Definition 1: Chebyshev polynomial, Tn(x), is a polynomial, where the integer, n denotes the degree of x, which is a variable within the interval [1, 1].…”
Section: Preliminariesmentioning
confidence: 99%
“…Yoon and Yoo [32] proposed a robust client-server authentication scheme to offer strong user authentication, although Kim et al [33] pointed out that the scheme of Yoon and Yoo was not resilient to password (offline) guessing attacks. Recently, Li et al [34] found some security weaknesses of Das [31] and Lee et al [35], such as session-key agreement and key-impersonation attacks using biometric-based user authentication schemes. As a consequence, none of the existing authentication schemes [9][10][11][12][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42] fulfill the security properties of the AKA protocol and resist most of the potential attacks, such as password guessing, key impersonation, and so on, in the multimedia client-server environment.…”
Section: Related Workmentioning
confidence: 99%