117
Views
20
CrossRef citations to date
0
Altmetric
Articles

A secure user authentication protocol using elliptic curve cryptography

, , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

M. Alinejad, S. Hassan Zadeh & N. Biranvand. (2022) Digital signature with elliptic curves over the finite fields. Journal of Discrete Mathematical Sciences and Cryptography 25:5, pages 1289-1301.
Read now
Devershi Pallavi Bhatt, Linesh Raja & Shilpa Sharma. (2020) Light-weighted cryptographic algorithms for energy efficient applications. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 643-650.
Read now
Arpana Kumari & Vivek Kapoor. (2020) Competing secure text encryption in intranet using elliptic curve cryptography. Journal of Discrete Mathematical Sciences and Cryptography 23:2, pages 631-641.
Read now
Vishal Choudhary & Sunil Taruna. (2020) The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 95-114.
Read now
Neha Gupta & Vivek Kapoor. (2020) Hybrid cryptographic technique to secure data in web application. Journal of Discrete Mathematical Sciences and Cryptography 23:1, pages 125-135.
Read now
Vishnu Shankar & Karan Singh. (2019) An improved user authentication scheme on smartphone using dominating attribute of touch data. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1549-1561.
Read now

Articles from other publishers (14)

Saeed Banaeian Far, Maryam Rajabzadeh Asaar & Afrooz Haghbin. (2023) Distributed auditing protocol for untraceable transactions. Journal of Information Security and Applications 73, pages 103429.
Crossref
Dana Simian, Oana Adriana Ticleanu & Nicolae Constantinescu. (2022) Characterization of a cubic interpolation scheme dependent on two parameters and applications. Annals of the University of Craiova - Mathematics and Computer Science Series 49:2, pages 445-460.
Crossref
Daniel Ioan Hunyadi, Oana-Adriana Ticleanu & Nicolae Constantinescu. (2022) Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining. Mathematics 11:1, pages 122.
Crossref
Waseem Akram, Khalid Mahmood, Xiong Li, Mazhar Sadiq, Zhihan Lv & Shehzad Ashraf Chaudhry. (2022) An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Computer Networks 217, pages 109335.
Crossref
A. Sathish, A. Bajulunisha, R. Sridevi & S. Vatchala. (2022) Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud. Journal of Intelligent & Fuzzy Systems 42:6, pages 4805-4819.
Crossref
Yousra Berguig, Jalal Laassiri & Sanae Hanaoui. (2021) Anonymous and lightweight secure authentication protocol for mobile Agent system. Journal of Information Security and Applications 63, pages 103007.
Crossref
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad & Ahmed A. Abd El-Latif. (2021) A secure and efficient key agreement framework for critical energy infrastructure using mobile device. Telecommunication Systems 78:4, pages 539-557.
Crossref
Catarina Silva, Vitor A. Cunha, Joao P. Barraca & Rui L. Aguiar. (2021) Hands-on evaluation of the cryptographic overhead on wireless sensor networks. Hands-on evaluation of the cryptographic overhead on wireless sensor networks.
B. D. Deebak, Fadi Al-Turjman & Anand Nayyar. (2020) Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimedia Tools and Applications 80:11, pages 17103-17128.
Crossref
Nissa Mehibel & M'hamed Hamadouche. (2021) Authenticated secret session key using elliptic curve digital signature algorithm. Security and Privacy 4:2.
Crossref
Francisco Eugenio Potestad-Ordóñez, Manuel Valencia-Barrero, Carmen Baena-Oliva, Pilar Parra-Fernández & Carlos Jesús Jiménez-Fernández. (2020) Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. Sensors 20:23, pages 6909.
Crossref
Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari & Muhammad Khurram Khan. (2020) RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Vehicular Communications 22, pages 100213.
Crossref
Adesh Kumari, Vinod Kumar, M. Yahya Abbasi, Saru Kumari, Pradeep Chaudhary & Chien-Ming Chen. (2020) CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC. IEEE Access 8, pages 107838-107852.
Crossref
M.Velladurai Muthukrishnan, Jayarajesh Vattam, Mayank Mangal, Ankit Sanghavi, Vivek Pandey & Muneesh Pal. (2022) Security Framework Based on Shannon’s Theory and Genetic Cryptography for Cloud Computing Framework. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.