FakePIN: Dummy Key Based Mobile User Authentication Scheme

Author(s):  
Siwan Kim ◽  
Hyunyi Yi ◽  
Jeong Hyun Yi
2014 ◽  
Vol 989-994 ◽  
pp. 4514-4518
Author(s):  
Yi Fei Yuan ◽  
Lian Zhong Liu ◽  
Chun Yan Han

The BYOD (Bring Your Own Device) scenario puts traditional two-factor authentication into great security challenge. To strengthen the authentication in BYOD scenario, we propose a security compliance based mobile user authentication scheme, which includes a novel calculation method for device identifier, and a fine-grained compliance strategy and its management. The scheme provides a secure authentication mechanism for BYOD scenario and satisfies the requirements of device authentication in mobile user authentication.


2019 ◽  
Vol 32 (14) ◽  
pp. e3980 ◽  
Author(s):  
Azeem Irshad ◽  
Shehzad Ashraf Chaudhry ◽  
Muhammad Shafiq ◽  
Muhammad Usman ◽  
Muhammad Asif ◽  
...  

2014 ◽  
Vol 631-632 ◽  
pp. 906-909
Author(s):  
Wei Jing Li ◽  
Ping Zhu ◽  
Hua Zhang ◽  
Zheng Ping Jin

Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the new scheme is more secure and efficient for wireless communications.


2017 ◽  
Vol 31 (2) ◽  
pp. e3461
Author(s):  
Prosanta Gope ◽  
SK Hafizul Islam ◽  
Mohammad S. Obaidat ◽  
Ruhul Amin ◽  
Pandi Vijayakumar

Sign in / Sign up

Export Citation Format

Share Document