2015
DOI: 10.14257/ijsia.2015.9.11.38
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Password-based Authenticated Key Agreement Scheme with Non-tamper Resistant Smart Cards

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
(20 reference statements)
0
2
0
Order By: Relevance
“…In 2015, Lee et al 2 proposed a nontamper smart card authentication key protocol scheme based on anonymous passwords. In 2017, Wu et al 3 noted that the scheme of Lee et al 2 is not resistant to smart card loss, spoofed users, spoofed server attacks, and so forth. Wu et al proposed an enhanced anonymous password authentication key agreement scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2015, Lee et al 2 proposed a nontamper smart card authentication key protocol scheme based on anonymous passwords. In 2017, Wu et al 3 noted that the scheme of Lee et al 2 is not resistant to smart card loss, spoofed users, spoofed server attacks, and so forth. Wu et al proposed an enhanced anonymous password authentication key agreement scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In 2021, Azrour et al 14 proposed a new, enhanced IoT authentication protocol based on the literature 2 , 5 , and 9 , that could resist replay, internal, and other attacks. In 2021, Vinoth et al 15 proposed a multifactor authentication key protocol scheme for industrial IoT security; however, this scheme could not deal with certain types of attacks, such as sensor node capture and replay attacks.…”
Section: Introductionmentioning
confidence: 99%