2016
DOI: 10.1016/j.jnca.2016.10.001
|View full text |Cite
|
Sign up to set email alerts
|

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
97
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 168 publications
(105 citation statements)
references
References 36 publications
0
97
0
Order By: Relevance
“…In this section, we will show that Jiang et al's scheme [10] is vulnerable to malicious user impersonation attack and node capture attack and suffer from forward security problem, low efficiency problem, no password change phase problem and time synchronization problem.…”
Section: Weaknesses Of Jiang Et Al's Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we will show that Jiang et al's scheme [10] is vulnerable to malicious user impersonation attack and node capture attack and suffer from forward security problem, low efficiency problem, no password change phase problem and time synchronization problem.…”
Section: Weaknesses Of Jiang Et Al's Schemementioning
confidence: 99%
“…Based on these, He et al improved Xue et al's scheme. However, Jiang et al [10] revealed that He et al's scheme is susceptible to stolen smart card attack and prone to tracking attack, and proposed an improved scheme in 2016.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, authentication ensures that only the legitimate users can access the resources on the target server. And authentication protocols have been widely used for various fields, including cloud computing, E-Health, and wireless sensor [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…They have become an important criterion of an ideal remote authentication scheme. Most of remote user authentication schemes [4,[40][41][42] are designed and evaluated according to them, while none of the schemes could actually satisfy them simultaneously. Therefore, many researchers begin to pay more attention to e a l 2 Password dependent 3 No verification table 4 Freely chosen password by the users 5 F o r w a r d s e c r e c y 6…”
Section: Introductionmentioning
confidence: 99%