Jinan University

Displaying 1-2 of 2 results

  • White Papers // Oct 2013

    An Improvement on An Efficient Mobile Authentication Scheme for Wireless Networks

    Mobile communication network has brought the user's great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the...

    Provided By Jinan University

  • White Papers // Dec 2011

    Enhanced Biometrics-Based Remote User Authentication Scheme Using Smart Cards

    In 2010, Li and Hwang proposed an efficient biometrics-based remote user authentication scheme using smart card. Recently, for improving its security and supporting session key agreement, Li et al. proposed an improvement. The biometrics authentication system offers several advantages over other security methods. Passwords might be divulged or forgotten, and...

    Provided By Jinan University

  • White Papers // Oct 2013

    An Improvement on An Efficient Mobile Authentication Scheme for Wireless Networks

    Mobile communication network has brought the user's great convenience. However, network security issues are outstanding increasingly. Authentication is the most essential procedure for preventing illegitimate, unauthorized or insecure devices from making access to the network. Tang and Wu proposed an efficient mobile authentication scheme for wireless networks, and claimed the...

    Provided By Jinan University

  • White Papers // Dec 2011

    Enhanced Biometrics-Based Remote User Authentication Scheme Using Smart Cards

    In 2010, Li and Hwang proposed an efficient biometrics-based remote user authentication scheme using smart card. Recently, for improving its security and supporting session key agreement, Li et al. proposed an improvement. The biometrics authentication system offers several advantages over other security methods. Passwords might be divulged or forgotten, and...

    Provided By Jinan University