To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their scheme could withstand various attacks. This paper reviews Lee et al.’s scheme and provides a security analysis on it. Our analysis shows that Lee et al. is vulnerable to the impersonation attack, the server spoofing attack, and the off-line password guessing attack
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
With the significant advances in communication networks over the last few decades, smart cards have ...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
[[abstract]]Recently, Lee et al. proposed a secure dynamic ID based remote user authentication schem...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
The rapid development of information and network technologies motivates the emergence of various new...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
With the significant advances in communication networks over the last few decades, smart cards have ...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
[[abstract]]Recently, Lee et al. proposed a secure dynamic ID based remote user authentication schem...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
The rapid development of information and network technologies motivates the emergence of various new...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
With the significant advances in communication networks over the last few decades, smart cards have ...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...