Yeh et al., in 2002, proposed a one-time password authentication scheme using smart cards. Subsequently, Tsuji et al. and Ku et al. respectively showed that Yeh et al.’s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.’s scheme. Lee and Chen claimed that their improvement can effectively withstand the stolen-verifier attack and is as efficient as Yeh et al.’s scheme. This paper, however, will point out that Lee and Chen’s improvement is still vulnerable to a masquerade attack. And, a simple improvement is given to resist the masquerade attack. 1
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
Yeh, Shen, and Hwang recently proposed a secure one-time password authentication scheme using smart ...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
[[abstract]]In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with s...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
Yeh, Shen, and Hwang recently proposed a secure one-time password authentication scheme using smart ...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
[[abstract]]In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with s...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...