Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 719470, 16 pages
http://dx.doi.org/10.1155/2014/719470
Research Article

A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

1Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India
2Department of Mathematics, Indian Institute of Technology, Kharagpur 721 302, India

Received 25 August 2013; Accepted 3 February 2014; Published 29 April 2014

Academic Editors: G. Bordogna and W.-J. Hwang

Copyright © 2014 Ashok Kumar Das et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Mrudula Sarvabhatla, and Chandra Sekhar Vorugunti, “A robust mutual authentication scheme for data security in cloud architecture,” 2015 7th International Conference on Communication Systems and Networks (COMSNETS), pp. 1–6, . View at Publisher · View at Google Scholar
  • Mrudula Sarvabhatla, M. Giri, and Chandra Sekhar Vorugunti, “Cryptanalysis of “a robust and effective smart card-based remote user authentication mechanism using hash function”,” 2014 International Conference on Computer and Communication Technology (ICCCT), pp. 123–128, . View at Publisher · View at Google Scholar
  • Omid Mir, and Morteza Nikooghadam, “A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services,” Wireless Personal Communications, vol. 83, no. 4, pp. 2439–2461, 2015. View at Publisher · View at Google Scholar
  • Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, “An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card,” Journal of Information Security and Applications, vol. 21, pp. 1–19, 2015. View at Publisher · View at Google Scholar