2021
DOI: 10.1007/s11227-021-03857-7
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(27 citation statements)
references
References 28 publications
0
25
0
Order By: Relevance
“…• We analyse security of Bouchaala et al's 35 protocol to illustrate its vulnerability to replay and KSSTI attacks. Furthermore, security analysis of Kaur et al's 36 protocol reveals that it is prone to a replay attack and Dharminder et al's 37 protocol is vulnerable to KSSTI and user traceability attacks.…”
Section: Motivations and Contributionmentioning
confidence: 99%
See 3 more Smart Citations
“…• We analyse security of Bouchaala et al's 35 protocol to illustrate its vulnerability to replay and KSSTI attacks. Furthermore, security analysis of Kaur et al's 36 protocol reveals that it is prone to a replay attack and Dharminder et al's 37 protocol is vulnerable to KSSTI and user traceability attacks.…”
Section: Motivations and Contributionmentioning
confidence: 99%
“…This section reviews different phases in Bouchaala et al's protocol 35 . Table 2 lists different notations incorporated in this article.…”
Section: Security Analysis Of Bouchaala Et Al's Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…When plain images are transmitted directly online, they will be vulnerable to various cyber-attacks such as stealing and tampering, which may cause huge losses to the owner of the images. Therefore, image encryption plays an important role in ensuring the security of information [3], which also progresses the study of cryptography. At present, there have been a wide range of secure and effective data encryption technologies proposed by cryptographic experts [21], such as DES [6], AES [20], RSA, and RC6.…”
Section: Introductionmentioning
confidence: 99%