[1] Inam ul Haq, Jian Wang, Youwen Zhu, and Saad Maqbool. A survey of authenticated key agreement protocols for multi-server architecture. Journal of Information Security and Applications, 55:102639, 2020.
[2] Wenming Wang, Haiping Huang, Fu Xiao, Qi Li, and Lingyan Xue. An adaptive secure handover authenticated key agreement for multiserver architecture communication applications. IEEE Transactions on Vehicular Technology, 71(9):9830–9839, 2022.
[3] Sudip Kumar Palit, Mohuya Chakraborty, and Subhalaxmi Chakraborty. Performance analysis of 5gmaka: lightweight mutual authentication and key agreement scheme for 5g network. The Journal of Supercomputing, 79(4):3902–3935, 2023.
[4] Li-Hua Li, Luon-Chang Lin, and Min-Shiang Hwang. A remote password authentication scheme for multiserver architecture using neural networks. IEEE Transactions on Neural Networks, 12(6):1498–1504, 2001.
[5] Dexin Yang and Bo Yang. A biometric password-based multi-server authentication scheme with smart card. In 2010 international conference on computer design and applications, volume 5, pages V5–554. IEEE, 2010.
[6] SK Hafizul Islam. A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wireless Personal Communications, 79(3):1975–1991, 2014.
[7] Debiao He, Sherali Zeadally, Neeraj Kumar, and Wei Wu. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE transactions on information forensics and
security, 11(9):2052–2064, 2016.
[8] Ruhul Amin, SK Hafizul Islam, Mohammad S Obaidat, GP Biswas, and Kuei-Fang Hsiao. An anonymous and robust multi-server authentication protocol using multiple registration servers. International Journal of Communication Systems, 30(18):e3457, 2017.
[9] Ashish Kumar and Hari Om. An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digital Communications and Networks, 4(1):27–38, 2018.
[10] Subhas Barman, Ashok Kumar Das, Debasis Samanta, Samiran Chattopadhyay, Joel JPC Rodrigues, and Youngho Park. Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access, 6:38578–38594, 2018.
[11] Tsu-Yang Wu, Zhiyuan Lee, Mohammad S Obaidat, Saru Kumari, Sachin Kumar, and Chien-Ming Chen. An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access, 8:28096–28108, 2020.
[12] Prasanta Kumar Roy and Ansuman Bhattacharya. A group key-based lightweight mutual authentication and key agreement (maka) protocol for multi-server environment. The Journal of Supercomputing, 78(4):5903–5930, 2022.
[13] Yuelei Xiao and Shan Gao. 5gaka-lcco: A secure 5g authentication and key agreement protocol with less communication and computation overhead. Information, 13(5):257, 2022.
[14] Xinxin Hu, Caixia Liu, Shuxin Liu, Jinsong Li, and Xiaotao Cheng. A vulnerability in 5g authentication protocols and its countermeasure. IEICE TRANSACTIONS on Information and Systems, 103(8):1806–1809, 2020.
[15] Xinxin Hu, Caixia Liu, Shuxin Liu, and Xiaotao Cheng. A security enhanced 5g authentication scheme for insecure channel. IEICE TRANSACTIONS on Information and Systems, 103(3):711–713, 2020.
[16] Mohammad Mahdi Modiri, Mahmoud Salmasizadeh, Javad Mohajeri, and Babak Hossein Khalaj. Two protocols for improving security during the authentication and key agreement procedure in the 3gpp networks. Computer Communications, 211:286–301, 2023.
[17] Yuelei Xiao and Yang Wu. 5g-ipaka: An improved primary authentication and key agreement protocol for 5g networks. Information, 13(3):125, 2022.
[18] Junho Lee, Dongwook Kim, Jinhyun Park, and Hyungweon Park. A multi-server authentication protocol achieving privacy protection and traceability for 5g mobile edge computing. In 2021 IEEE international conference on consumer electronics (ICCE), pages 1–4. IEEE, 2021.
[19] Shivangi Shukla and Sankita J Patel. A design of provably secure multi-factor ecc-based authentication protocol in multi-server cloud architecture. Cluster Computing, pages 1–22, 2023.
[20] 3GPP Group. Authentication and key management for applications (akma) in 5g, 2022. https://www.3gpp.org/technologies/akma [Accessed: (2022/03/04)].