Identity authentication scheme of cloud storage for user anonymity via USB token

Author(s):  
Linmei Jiang ◽  
Xiaochao Li ◽  
L. L. Cheng ◽  
Donghui Guo
2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Muhammad Khurram Khan ◽  
Saru Kumari

The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.


Author(s):  
Yuxiang Chen ◽  
Guishan Dong ◽  
Yao Hao ◽  
Zhaolei Zhang ◽  
Haiyang Peng ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 47144-47160 ◽  
Author(s):  
Zahid Ghaffar ◽  
Shafiq Ahmed ◽  
Khalid Mahmood ◽  
Sk Hafizul Islam ◽  
Mohammad Mehedi Hassan ◽  
...  

2020 ◽  
Vol 69 (5) ◽  
pp. 5403-5415
Author(s):  
Liangjun Song ◽  
Gang Sun ◽  
Hongfang Yu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

Sign in / Sign up

Export Citation Format

Share Document