2014
DOI: 10.1016/j.eswa.2014.07.004
|View full text |Cite
|
Sign up to set email alerts
|

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
162
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 186 publications
(162 citation statements)
references
References 46 publications
0
162
0
Order By: Relevance
“…T c : time required for executing comparison operation. Table 3 shows that the computational cost of the proposed scheme is relatively lower than Mishra et al's [17] scheme but with higher security. We can conclude that the security can be enhanced by affording a little bit of extra cost.…”
Section: Performance Analysismentioning
confidence: 89%
See 3 more Smart Citations
“…T c : time required for executing comparison operation. Table 3 shows that the computational cost of the proposed scheme is relatively lower than Mishra et al's [17] scheme but with higher security. We can conclude that the security can be enhanced by affording a little bit of extra cost.…”
Section: Performance Analysismentioning
confidence: 89%
“…In 2014, Chuang and Chen [16] proposed a multi-server authenticated key agreement scheme using smart cards and biometrics. However, both Mishra et al [17] and Maitra and Giri [18] showed their scheme is insecure against stolen smart card attack, impersonation attack, forgery attack and session key discloser attack. Later, Mishra et al [17] proposed an improved biometric based remote user authentication scheme.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…We list the results of functionality comparisons of our scheme and other related schemes [14,15] in the table 2, and from which we can see that our scheme has more security properties. Both Mishra et al"s scheme [14] and Baruah et al"s scheme [15] cannot resist stolen smart card attack and denial of service attack, and they are both cannot protect user"s anonymity due to an adversary can trace a special user using the static information in the login request message.…”
Section: Functionality and Performance Comparisonsmentioning
confidence: 99%