is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs. They claimed that their proposed scheme provided identity privacy, mutual authentication, and half-forward secrecy. In this paper, we point out that Juang et al.'s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity. Keywords—PWLANs, user privacy, smart card, authentication, key exchange I
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
Wireless Sensor Networks (WSNs) play an indispensable role in the application of smart homes, smart ...
Recently, Kang et al. discussed some security flaws of Wu et al's and Wei et al.'s authent...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
Wireless Sensor Networks (WSNs) play an indispensable role in the application of smart homes, smart ...
Recently, Kang et al. discussed some security flaws of Wu et al's and Wei et al.'s authent...
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. propos...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
Recently, Chen et al. proposed a practical authentication protocol for supporting anonymous roaming ...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification) smar...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
Wireless Sensor Networks (WSNs) play an indispensable role in the application of smart homes, smart ...
Recently, Kang et al. discussed some security flaws of Wu et al's and Wei et al.'s authent...