2018
DOI: 10.1007/978-3-030-03712-3_2
|View full text |Cite
|
Sign up to set email alerts
|

An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…In this thesis, after a brief overview of the related works in the area of user authentication schemes for IoT, assessing their advantages and drawbacks, we have proposed a new RSAbiometric based authentication protocol for smart-homes using smartphone (called RSA-B-ASH-S scheme). This scheme, in addition to satisfying all the security features of the authentication scheme introduced in [3], is also shown to satisfy the perfect forward secrecy, considered as a great enhancement to the RSA-ASH-SC scheme [3] when considering the increased significance of privacy and security in IoT [1].…”
Section: Chapter 5 Conclusionmentioning
confidence: 96%
See 4 more Smart Citations
“…In this thesis, after a brief overview of the related works in the area of user authentication schemes for IoT, assessing their advantages and drawbacks, we have proposed a new RSAbiometric based authentication protocol for smart-homes using smartphone (called RSA-B-ASH-S scheme). This scheme, in addition to satisfying all the security features of the authentication scheme introduced in [3], is also shown to satisfy the perfect forward secrecy, considered as a great enhancement to the RSA-ASH-SC scheme [3] when considering the increased significance of privacy and security in IoT [1].…”
Section: Chapter 5 Conclusionmentioning
confidence: 96%
“…In [3], Raniyal proposed an RSA-based two-factor user authentication scheme using smart card (called RSA-ASH-SC). In this scheme, the Rebalanced-Multi-Power RSA scheme [10] is used as underlying RSA algorithm.…”
Section: Authentication Schemes For Smart Home Environmentmentioning
confidence: 99%
See 3 more Smart Citations