2014
DOI: 10.1016/j.eswa.2013.08.040
|View full text |Cite
|
Sign up to set email alerts
|

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
179
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 198 publications
(179 citation statements)
references
References 41 publications
0
179
0
Order By: Relevance
“…The organization of the paper is planned as: in this section, basic notations, terminologies and different phases of the scheme will be discussed in detail; section 5 the proposed scheme is formally analyzed using (Burrows, Abadi, & Needham, 1995;Mart´ın & Andrew, 1998) and (Chuang & Chen, 2014) techniques and in section 6 the informal analysis of the proposed authentication scheme will be presented using general intelligence and experience while in the last section the performance comparison of the scheme will be given comprehensively. …”
Section: The Proposed Schemementioning
confidence: 99%
See 2 more Smart Citations
“…The organization of the paper is planned as: in this section, basic notations, terminologies and different phases of the scheme will be discussed in detail; section 5 the proposed scheme is formally analyzed using (Burrows, Abadi, & Needham, 1995;Mart´ın & Andrew, 1998) and (Chuang & Chen, 2014) techniques and in section 6 the informal analysis of the proposed authentication scheme will be presented using general intelligence and experience while in the last section the performance comparison of the scheme will be given comprehensively. …”
Section: The Proposed Schemementioning
confidence: 99%
“…Gong-Needham-Yahalom (Chuang & Chen, 2014) Logic is another way of formally proving a cryptographic protocol. It is just like that of BAN logic.…”
Section: Gny Logicmentioning
confidence: 99%
See 1 more Smart Citation
“…In the login phase, the user inputs his biometric key which is saved in his USB. Compared with Chuang et al's scheme in [9], their scheme needs extra hardware and software to complete the verification of a user's biometric. Our scheme requires a USB device that is available in most of the terminate machines and focuses on features of hand geometry for increasing performance and decreasing costs.…”
Section: Theorem 1 Our Proposed Scheme Can Support Mutual Authenticamentioning
confidence: 99%
“…Furthermore, the essential feature of the biometric is uniqueness in that everybody has various sources of biometrics such as fingerprints and eye recognition, and it is hard for genuine user's biometrics to be lost/stolen because only the actual user enters personal biometrics with his smart card to login to the system. There are many schemes based on biometrics with smart cards [9,13], but these schemes require extra hardware and software for each login phase.…”
Section: Introductionmentioning
confidence: 99%