Downloads: 115 | Views: 298
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014 | Popularity: 6.3 / 10
Analysis of Password based Multi-server Authentication Schemes
Swati Nema, Anamika Soni
Abstract: As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment in terms of security features provided and the computational complexity. This effort assists the researchers to work in different directions towards design and development of secure and efficient smart card authentication scheme.
Keywords: Authentication, Denial-of-Service attack, insider attack, perfect forward secrecy, smart card, user anonymity
Edition: Volume 3 Issue 10, October 2014
Pages: 873 - 876
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1948 - 1954A New Security Business Frame work for Resource Attestation in cloud Environment
Vallabhaneni. Hema Latha, Kolluru. Suresh Babu
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 2328 - 2331Detection of Packet Dropping Attacks in Wireless Ad-Hoc Network Based On Privacy Preserving Public Auditing
Kirti B. Mane, N. J. Pathan
Downloads: 118
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1857 - 1861Design and Implementation of User Anonymity and Authentication Scheme for Decentralized Access Control in Clouds: Review
Pooja R. Vyawhare, Namrata D. Ghuse
Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 2008 - 2010Privacy Preserving Utility Verification Security of Data Published by Non Interactive Differentially Private Mechanisms
Gouri Namdeo Kale, Dr. S. N. Kini