ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Novel User Authentication Scheme Based on QR-Code
Journal of Networks
◽
10.4304/jnw.5.8.937-941
◽
2010
◽
Vol 5
(8)
◽
Cited By ~ 26
Author(s):
Kuan-Chieh Liao
◽
Wei-Hsun Lee
Keyword(s):
User Authentication
◽
Authentication Scheme
◽
Qr Code
◽
User Authentication Scheme
Download Full-text
Related Documents
Cited By
References
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device
Lecture Notes in Electrical Engineering - Information Technology Convergence, Secure and Trust Computing, and Data Management
◽
10.1007/978-94-007-5083-8_30
◽
2012
◽
pp. 241-247
◽
Cited By ~ 3
Author(s):
Youngsook Lee
◽
Jeeyeon Kim
◽
Woongryul Jeon
◽
Dongho Won
Keyword(s):
Mobile Device
◽
User Authentication
◽
Authentication Scheme
◽
Qr Code
◽
User Authentication Scheme
Download Full-text
A User Authentication Scheme Using Real-Time Location, QR-Code, and One Time Password: A Preliminary Work
2018 International Conference on Electrical Engineering and Informatics (ICELTICs)(44501)
◽
10.1109/iceltics.2018.8548786
◽
2018
◽
Author(s):
Anggraeni Shinta Dewi
◽
Amiruddin Amiruddin
Keyword(s):
Real Time
◽
User Authentication
◽
Authentication Scheme
◽
Qr Code
◽
Preliminary Work
◽
User Authentication Scheme
◽
One Time Password
Download Full-text
Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments
IEICE Transactions on Communications
◽
10.1587/transcom.e95.b.3052
◽
2012
◽
Vol E95.B
(9)
◽
pp. 3052-3054
◽
Cited By ~ 1
Author(s):
Debiao HE
◽
Hao HU
Keyword(s):
User Authentication
◽
Authentication Scheme
◽
User Authentication Scheme
◽
Multi Server
Download Full-text
ADVANCE REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v78.i11.40
◽
2019
◽
Vol 78
(11)
◽
pp. 957-971
Author(s):
S. Kumar
◽
V. Singh
◽
V. Sharma
◽
Vijay P Singh
Keyword(s):
Smart Card
◽
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
Cryptanalysis of a Remote User Authentication Scheme
Journal of Environmental Science Computer Science and Engineering & Technology
◽
10.24214/jecet.b.6.4.20107
◽
2017
◽
Vol 6
(4)
◽
Keyword(s):
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
Science China Information Sciences
◽
10.1007/s11432-020-2975-6
◽
2021
◽
Vol 65
(1)
◽
Author(s):
Chenyu Wang
◽
Ding Wang
◽
Guoai Xu
◽
Debiao He
Keyword(s):
Industry 4.0
◽
User Authentication
◽
Privacy Preserving
◽
Authentication Scheme
◽
Forward Secrecy
◽
User Authentication Scheme
Download Full-text
Improved remote user authentication scheme using bilinear pairings
Proceedings of the 2009 International Conference on Hybrid Information Technology - ICHIT '09
◽
10.1145/1644993.1645105
◽
2009
◽
Author(s):
Eun-A Jun
◽
Jea Doek Ji
◽
Jongin Lim
◽
Seok Won Jung
Keyword(s):
User Authentication
◽
Bilinear Pairings
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
Applying biometrics to design three-factor remote user authentication scheme with key agreement
Security and Communication Networks
◽
10.1002/sec.767
◽
2013
◽
pp. n/a-n/a
◽
Cited By ~ 7
Author(s):
Xiong Li
◽
Jianwei Niu
◽
Zhibo Wang
◽
Caisen Chen
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
◽
Three Factor
Download Full-text
A New Biometric-based User Authentication Scheme without Using Password for Wireless Sensor Networks
2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
◽
10.1109/wetice.2011.47
◽
2011
◽
Cited By ~ 8
Author(s):
Eun-Jun Yoon
◽
Kee-Young Yoo
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
User Authentication
◽
Authentication Scheme
◽
Wireless Sensor
◽
User Authentication Scheme
Download Full-text
A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
International Journal of Communication Systems
◽
10.1002/dac.2933
◽
2015
◽
Vol 30
(1)
◽
pp. e2933
◽
Cited By ~ 60
Author(s):
Ashok Kumar Das
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Smart Card
◽
User Authentication
◽
Authentication Scheme
◽
Wireless Sensor
◽
Fuzzy Extractor
◽
User Authentication Scheme
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close