With the significant advances in communication networks over the last few decades, smart cards have been widely used in many e-commerce applications and network security protocols due to their low cost, portability, efficiency and cryptographic properties. In this paper, we analyze Sood et al.‟s smart card based authentication scheme and demonstrate that the scheme is vulnerable to masquerade user attack, offline password guessing attack, time concurrency weaknesses and fails to achieve mutual authentication. A secure dynamic identity based remote user authentication scheme without verification tables, is proposed in this paper and the scheme resolves the aforementioned problems of Sood et al.‟s scheme. The computation cost of the proposed ...
AbstractA remote password authentication scheme is a mechanism used to support a computer system to ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractA remote password authentication scheme is a mechanism used to support a computer system to ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractA remote password authentication scheme is a mechanism used to support a computer system to ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...