2014
DOI: 10.1002/sec.1109
|View full text |Cite
|
Sign up to set email alerts
|

A two‐factor authentication scheme with anonymity for multi‐server environments

Abstract: In a multi‐server environment, remote user authentication is essential for secure communication. Recently, Liao and Wang, Hsiang and Shih, and Lee et al. have successively proposed various remote user authentication schemes for multi‐server environments. However, each of these schemes exhibits distinct security weaknesses. The Liao–Wang scheme is vulnerable to insider attacks and masquerade attacks, and fails to provide two‐factor security and mutual authentication. The Hsiang–Shih scheme is vulnerable to masq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 47 publications
(77 citation statements)
references
References 32 publications
0
77
0
Order By: Relevance
“…It is evident from the reported results that our scheme fulfills the design properties, and our scheme is also secure under the test of AVISPA using OFMC and CLAtSe backends with the bounded number of sessions. (Li et al, 2015) and Chen-Lee's scheme (Chen et al, 2015). …”
Section: Analysis Of Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…It is evident from the reported results that our scheme fulfills the design properties, and our scheme is also secure under the test of AVISPA using OFMC and CLAtSe backends with the bounded number of sessions. (Li et al, 2015) and Chen-Lee's scheme (Chen et al, 2015). …”
Section: Analysis Of Resultsmentioning
confidence: 99%
“…Li et al's scheme (Li et al, 2015) is vulnerable to privileged-insider attack, stolen smart card attack and user impersonation attack, and it does not support formal security verification using AVISPA tool. Similar to Li et al's scheme, Chen-Lee's scheme (Chen et al, 2015) is vulnerable to privilegedinsider attack, stolen smart card attack and user impersonation attack, and it does not support formal security verification using AVISPA tool. On the other hand, our proposed scheme provides better security features as compared to those for both Pippal et al's scheme and Wei et al's scheme.…”
Section: Functionality Comparisonmentioning
confidence: 95%
See 3 more Smart Citations