Comparative Analysis of Smart Card Authentication Schemes

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1

Abstract

 Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a variety of attacks. To withstand the possible attacks for verification table, smart card based authentication scheme has been proposed as an alternative solution. Smart card is a small, tamper-resistant device providing users with a convenient storage and processing capability, it is widely used for a range of applications such as remote user login, online banking, ID verification, access control and e-commerce etc. This article gives comparative analysis of major smart card authentication schemes for single server as well as multi-server environment

Authors and Affiliations

Toshi jain

Keywords

Related Articles

Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme

The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...

Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security

Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...

 Application of Machine Learning Algorithm in Indian Stock Market Data

 Abstract: Prediction of Indian stock market data with data mining technique is one of the fascinating issues for researchers over the past decade. Statistical and traditional methods are no longer feasible for prop...

 Realization of web hotspot rescue in a distributed system

 Web hotspot is considered as a serious problem in case of distributed systems. When the load in a website is suddenly increases, the situation is termed as web hotspot. This kind of situation can seriously degrad...

 An Efficient Approach for Requirement Traceability Integrated  With Software Repository

 Traceability links between requirements of a system and its source code are helpful in reducing system conception effort. During software updates and maintenance, the traceability links become invalid since &nbsp...

Download PDF file
  • EP ID EP88163
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

Toshi jain (2014).  Comparative Analysis of Smart Card Authentication Schemes. IOSR Journals (IOSR Journal of Computer Engineering), 16(1), 91-97. https://europub.co.uk/articles/-A-88163