Articles with "server environment" as a keyword



Photo from wikipedia

Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-3961-5

Abstract: With non-stop development of e-commerce and different internet-based applications’ demands, service providers include many physical servers scattering all over the world. If some users would like to use various services, they have to repeatedly register.… read more here.

Keywords: authentication; scheme; multi server; server environment ... See more keywords
Photo from wikipedia

Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-016-2341-x

Abstract: Recently, Wen et al. have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks. In this paper, we review Wen et al.’s protocol and find that it… read more here.

Keywords: multi server; server environment; authentication; three factor ... See more keywords
Photo by lensingmyworld from unsplash

Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-017-2665-1

Abstract: Recently, Guo–Wen projected an improved authentication protocol in multi-server environment, proclaiming it to preserve user anonymity. However, the authors revisit Guo–Wen’s protocol and discover various malicious threats, i.e., (1) password guessing threat, (2) identity guessing… read more here.

Keywords: authentication; scheme; protocol; threat ... See more keywords