Multi-Server Authentication and Key Exchange
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 132 , Downloads: 105 | CTR: 80 %

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad

Multi-server authentication and key exchange is where the multiple servers contribute in the authentication process of clients, and granting the access to authenticated clients. Present protocols used for authentication purpose keeps the authentication information or secrete codes of all clients on a single server, which is very insecure from the prospect of security. In this paper I have proposed a multi-server authentication and key exchange process where client communicate with the main server by means of intermediate servers, intermediate servers are very useful for checking or verifying authenticity of clients. This protocol is simple and secure against present two server password-only authenticated key exchange protocols.

Keywords: Authentication, key exchange, personification, identity theft

Edition: Volume 5 Issue 5, May 2016

Pages: 1701 - 1703

Share this Article

How to Cite this Article?

Muzammil M. Ahmad, "Multi-Server Authentication and Key Exchange", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163614, Volume 5 Issue 5, May 2016, 1701 - 1703

132 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 142 , Downloads: 99 | CTR: 70 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Similar Articles with Keyword 'key exchange'

Views: 128 , Downloads: 103 | CTR: 80 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Views: 114 , Downloads: 104 | CTR: 91 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Views: 144 , Downloads: 104 | CTR: 72 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2314 - 2318

Cloud And Parallel Network File System Using Authenticated Key Exchange Protocols

Anupama T, Refeeda K

Share this Article

Views: 132 , Downloads: 105 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1701 - 1703

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad

Share this Article

Similar Articles with Keyword 'identity theft'

Views: 132 , Downloads: 105 | CTR: 80 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1701 - 1703

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad

Share this Article

Views: 154 , Downloads: 109 | CTR: 71 % | Weekly Popularity: ⮙6

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Views: 133 , Downloads: 111 | CTR: 83 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2336 - 2339

Online Payment System using BPCS Steganography and Visual Cryptography

S. R. Khonde, Dheeraj Agarwal, Shrinivas Deshmukh

Share this Article

Views: 137 , Downloads: 113 | CTR: 82 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Views: 176 , Downloads: 130 | CTR: 74 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 34 - 38

Countering Phishing Threats using Visual Cryptography

G. Pavithra, D. S. John Deva Prasanna

Share this Article
Top