International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 298

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014 | Popularity: 6.3 / 10


     

Analysis of Password based Multi-server Authentication Schemes

Swati Nema, Anamika Soni


Abstract: As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment in terms of security features provided and the computational complexity. This effort assists the researchers to work in different directions towards design and development of secure and efficient smart card authentication scheme.


Keywords: Authentication, Denial-of-Service attack, insider attack, perfect forward secrecy, smart card, user anonymity


Edition: Volume 3 Issue 10, October 2014


Pages: 873 - 876



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Swati Nema, Anamika Soni, "Analysis of Password based Multi-server Authentication Schemes", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 873-876, https://www.ijsr.net/getabstract.php?paperid=OCT14222, DOI: https://www.doi.org/10.21275/OCT14222



Similar Articles

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Downloads: 113

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 2328 - 2331

Detection of Packet Dropping Attacks in Wireless Ad-Hoc Network Based On Privacy Preserving Public Auditing

Kirti B. Mane, N. J. Pathan

Share this Article

Downloads: 118

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1857 - 1861

Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review

Pooja R. Vyawhare, Namrata D. Ghuse

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 2008 - 2010

Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms

Gouri Namdeo Kale, Dr. S. N. Kini

Share this Article



Top