- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
Journal of Biomedicine and Biotechnology
Volume 2012 (2012), Article ID 519723, 6 pages
Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards
Division of Computer and Media Information Engineering, Kangnam University,
111, Gugal-dong, Giheung-gu, Yongin-si, Gyounggi-do, 446-702, Republic of Korea
Received 25 May 2012; Accepted 7 June 2012
Academic Editor: Sabah Mohammed
Copyright © 2012 Younghwa An. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citations to this Article [16 citations]
The following is the list of published articles that have cited the current article.
- Nadia M. G. Al-Saidi, Mohamad Rushdan Md. Said, and Wan Ainun M. Othman, “Password Authentication Based on Fractal Coding Scheme,” Journal of Applied Mathematics, vol. 2012, pp. 1–16, 2012.
- Saru Kumari, Mridul K. Gupta, Muhammad Khurram Khan, and Xiong Li, “An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement,” Security and Communication Networks, 2013.
- Martin Drahansky, Michal Dolezel, Jan Vana, Eva Brezinova, Jaegeol Yim, and Kyubark Shim, “New Optical Methods for Liveness Detection on Fingers,” BioMed Research International, vol. 2013, pp. 1–11, 2013.
- Muhammad Khurram Khan, and Saru Kumari, “An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity,” BioMed Research International, vol. 2013, pp. 1–9, 2013.
- Shin-Yan Chiou, “Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions,” BioMed Research International, vol. 2013, pp. 1–12, 2013.
- SK Hafizul Islam, “Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps,” Nonlinear Dynamics, 2014.
- Liling Cao, and Wancheng Ge, “Analysis and improvement of a multi-factor biometric authentication scheme,” Security and Communication Networks, 2014.
- Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao, and Xiaoke Zhao, “Robust three-factor remote user authentication scheme with key agreement for multimedia systems,” Security and Communication Networks, 2014.
- Li Jiping, Ding Yaoming, Xiong Zenggang, and Liu Shouyin, “An Improved Biometric-Based User Authentication Scheme for C/S System,” International Journal of Distributed Sensor Networks, vol. 2014, pp. 1–9, 2014.
- Ruhul Amin, SK Hafizul Islam, G. P. Biswas, Muhammad Khurram Khan, and Xiong Li, “Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems,” Journal of Medical Systems, vol. 39, no. 11, 2015.
- Deebak Bakkiam David, Muthaiah Rajappa, Thenmozhi Karupuswamy, and Swaminathan Pitchai Iyer, “A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System,” Wireless Personal Communications, 2015.
- Ashok Kumar Das, and Adrijit Goswami, “A robust anonymous biometric-based remote user authentication scheme using smart cards,” Journal of King Saud University - Computer and Information Sciences, 2015.
- Fan Wu, Lili Xu, Saru Kumari, and Xiong Li, “A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks,” Computers & Electrical Engineering, 2015.
- Fengtong Wen, Willy Susilo, and Guomin Yang, “Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards,” Wireless Personal Communications, vol. 80, no. 4, pp. 1747–1760, 2015.
- Yuanyuan Zhang, Muhammad Khurram Khan, Jianhua Chen, and Debiao He, “Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography,” Mathematical Problems in Engineering, vol. 2015, pp. 1–16, 2015.
- Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, and Debiao He, “A privacy preserving three-factor authentication protocol for e-Health clouds,” The Journal of Supercomputing, 2016.