117
Views
20
CrossRef citations to date
0
Altmetric
Articles

A secure user authentication protocol using elliptic curve cryptography

, , &

References

  • T. -H. Chen, H. -l. Yeh, W. -K. Shih, An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing, in: Multimedia and Ubiquitous Engineering (MUE), 2011 5th FTRA International Conference on, IEEE, pp. 155-159 (2011).
  • Kang, X. and Zhang, Identity-based authentication in cloud storage sharing, in: Multimedia Information Networking and Security (MINES), 2010 International Conference on, IEEE, pp. 851-855 (2010).
  • J. -H. Yang, C. -C. Chang, An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem, Computers & security 28 (3-4) 138-143 (2009). doi: 10.1016/j.cose.2008.11.008
  • X. Wu, J. Qu, Y. Feng, Security enhancement on an anonymous authentication scheme for wireless communications using smart cards, Journal of Discrete Mathematical Sciences and Cryptography 21 (5) 1139–1155 (2018). doi: 10.1080/09720529.2018.1489426
  • D. Wang, Y. Mei, C. -g. Ma, Z.-s. Cui, Comments on an advanced dynamic id-based authentication scheme for cloud computing, in: International Conference on Web Information Systems and Mining, Springer, 246-253 (2012).
  • D. Mishra, V. Kumar, S. Mukhopadhyay, A pairing-free identity based authentication framework for cloud computing, in: International Conference on Network and System Security, Springer, pp. 721-727 (2013).
  • V. Kumar, M. Ahmad, A. Kumari, P. Kumar, A study of pairing-free identity-based mutual authentication protocol for cloud computing, Int. journal of Engineering Research and Application 7 (7), 10-14 ((2017)). doi: 10.9790/9622-0707101014
  • Dhaka, V. S., Ramesh C. Poonia, and Linesh Raja, The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks, International Journal of Ad hoc, Sensor & Ubiquitous Computing 5.2: 1 (2014).
  • D. Mishra, Efficient and secure two-factor dynamic id-based password authentication scheme with provable security, Cryptologia 42 (2) 146-175 (2018). doi: 10.1080/01611194.2017.1325787
  • V. Kumar, M. Ahmad, P. Kumar, An identity-based authentication framework for big data security, in: Proceedings of 2nd International Conference on Communication, Computing and Networking, Springer, pp. 63-71 (2019).
  • V. Kumar, S. Jangirala, M. Ahmad, An efficient mutual authentication framework for healthcare system in cloud computing, Journal of medical systems 42 (8) 142 (2018). doi: 10.1007/s10916-018-0987-5
  • V. Kumar, M. Ahmad, A. Kumari, A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis, Telematics and Informatics, (2018).
  • Dhaka, V. S., R. C. Poonia, and L. Raja, A literature review on dedicated short range communication for intelligent transport, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 3.9: 1066-1071 (2013).
  • A. A. Khan, V. Kumar, M. Ahmad, An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach, Journal of King Saud University-Computer and Information Sciences. (2019).
  • Singh, V., et al., Source Redundancy Management and Host Intrusion Detection in Wireless Sensor Networks, Recent Patents on Computer Science 12.1 (2019).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.