Views: 132 , Downloads: 105 | CTR: 80 %
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
Multi-Server Authentication and Key Exchange
Muzammil M. Ahmad
Multi-server authentication and key exchange is where the multiple servers contribute in the authentication process of clients, and granting the access to authenticated clients. Present protocols used for authentication purpose keeps the authentication information or secrete codes of all clients on a single server, which is very insecure from the prospect of security. In this paper I have proposed a multi-server authentication and key exchange process where client communicate with the main server by means of intermediate servers, intermediate servers are very useful for checking or verifying authenticity of clients. This protocol is simple and secure against present two server password-only authenticated key exchange protocols.
Keywords: Authentication, key exchange, personification, identity theft
Edition: Volume 5 Issue 5, May 2016
Pages: 1701 - 1703
How to Cite this Article?
Muzammil M. Ahmad, "Multi-Server Authentication and Key Exchange", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163614, Volume 5 Issue 5, May 2016, 1701 - 1703
132 PDF Views | 105 PDF Downloads
Similar Articles with Keyword 'Authentication'
Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Views: 142 , Downloads: 99 | CTR: 70 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Similar Articles with Keyword 'key exchange'
Views: 128 , Downloads: 103 | CTR: 80 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1415 - 1419A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
Shivani Bhatia, Rekha Saraswat
Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2369 - 2372Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms
Jaskarandeep Punia, Rajesh Kumar Bawa
Views: 114 , Downloads: 104 | CTR: 91 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1952 - 1957Navigation Query Security through Privacy Preservation and Cryptography in VANETs
Anuradha T, Saba Tahseen
Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2314 - 2318Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols
Anupama T, Refeeda K
Views: 132 , Downloads: 105 | CTR: 80 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1701 - 1703Multi-Server Authentication and Key Exchange
Muzammil M. Ahmad
Similar Articles with Keyword 'identity theft'
Views: 132 , Downloads: 105 | CTR: 80 %
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 1701 - 1703Multi-Server Authentication and Key Exchange
Muzammil M. Ahmad
Views: 154 , Downloads: 109 | CTR: 71 % | Weekly Popularity: ⮙6
Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 310 - 313Secure Server Verification by using Encryption Algorithm and Visual Cryptography
Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan
Views: 133 , Downloads: 111 | CTR: 83 % | Weekly Popularity: ⮙5
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2336 - 2339Online Payment System using BPCS Steganography and Visual Cryptography
S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh
Views: 137 , Downloads: 113 | CTR: 82 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2178 - 2179Blocking Misbehaving User & Activities in Social Network
Rashmi Gourkar, Garima Singh
Views: 176 , Downloads: 130 | CTR: 74 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 34 - 38Countering Phishing Threats using Visual Cryptography
G. Pavithra, D. S. John Deva Prasanna