Comparative Analysis of Smart Card Authentication Schemes

نویسنده

  • Toshi jain
چکیده

Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a variety of attacks. To withstand the possible attacks for verification table, smart card based authentication scheme has been proposed as an alternative solution. Smart card is a small, tamper-resistant device providing users with a convenient storage and processing capability, it is widely used for a range of applications such as remote user login, online banking, ID verification, access control and e-commerce etc. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Password based Multi-server Authentication Schemes

As of today, numerous researchers have explored the issue of secure and efficient smart card based authentication scheme for these variety of application areas. This article explores the background research on the single server smart card authentication schemes as well as multi-server smart card authentication schemes and its associated research gaps. This article gives comparative analysis of ...

متن کامل

Remote User Authentication Schemes: A Review

To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks. In last decade authentication schemes based on smart card has been proposed to withstand the possible attacks on verification table. Smart card provides a convenient storage and processing capabilit...

متن کامل

Security Vulnerabilities of User Authentication Scheme Using Smart Card

With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...

متن کامل

A Novel Smart Card Authentication Scheme using Image Watermarking

One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...

متن کامل

A Study On ID-based Authentication Schemes for Telecare Medical Information System

The smart card based authentication schemes are designed and developed to ensure secure and authorized communication between remote user and the server. In recent times, many smart card based authentication schemes for the telecare medical information systems (TMIS) have been presented. In this article, we briefly discuss some of the recently published smart card based authentication schemes fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014