Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptography (ECC)—the elliptic curve discrete logarithm probl...
Published in: | Mathematics |
---|---|
Main Author: | Shohaimay F.; Ismail E.S. |
Format: | Article |
Language: | English |
Published: |
MDPI
2023
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85145890990&doi=10.3390%2fmath11010005&partnerID=40&md5=6a0f5fe4c6f07045cefefd7705918197 |
Similar Items
-
Authenticated Encryption Schemes: A Systematic Review
by: Jimale M.A.; Z'Aba M.R.; Kiah M.L.B.M.; Idris M.Y.I.; Jamil N.; Mohamad M.S.; Rohmad M.S.
Published: (2022) -
A new model of securing iris authentication using steganography
by: Zainal Abidin Z.; Manaf M.; Shibghatullah A.S.
Published: (2011) -
The adoption factors of two-factors authentication in blockchain technology for banking and financial institutions
by: Basori A.A.; Ariffin N.H.M.
Published: (2022) -
A preliminary review on web session hijacking
by: Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B.
Published: (2018) -
Secure Mobile Login using Three-Layer Graphical User Interface (GUI) Authentication
by: Kamal Bashah N.S.; Aiman Khairul Niza M.A.; Janom N.
Published: (2023)