Downloads: 108 | Views: 288
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.1 / 10
Multi-Server Authentication and Key Exchange
Muzammil M. Ahmad
Abstract: Multi-server authentication and key exchange is where the multiple servers contribute in the authentication process of clients, and granting the access to authenticated clients. Present protocols used for authentication purpose keeps the authentication information or secrete codes of all clients on a single server, which is very insecure from the prospect of security. In this paper I have proposed a multi-server authentication and key exchange process where client communicate with the main server by means of intermediate servers, intermediate servers are very useful for checking or verifying authenticity of clients. This protocol is simple and secure against present two server password-only authenticated key exchange protocols.
Keywords: Authentication, key exchange, personification, identity theft
Edition: Volume 5 Issue 5, May 2016
Pages: 1701 - 1703
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023
Pages: 2067 - 2069Application of Personification Thinking to Achieve Higher Software Quality
Ravikiran Mallappa
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1415 - 1419A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
Shivani Bhatia, Rekha Saraswat
Downloads: 106
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 1758 - 1764Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network
T. Sankar, M. Prakash