Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that Kim and Chung’s password-based remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version was proposed and claimed that it is secure against smart card security breach attacks. In this paper, however, we will show that Li et al.’s scheme still cannot withstand offline password guessing attack under the non-tamper resistance assumption of the smart card. In addition, their scheme is also prone to denial of service attack and fails to provide user anonymity and forward secrecy. Therefore, a robust scheme with a brief analysis is presented to overcome the identi...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
Recently, Chen et al. [B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication s...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
With the significant advances in communication networks over the last few decades, smart cards have ...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
Recently, Chen et al. [B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication s...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
99學年度洪文斌升等參考著作[[abstract]]Anonymity is one of the important properties of remote authentication sche...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
With the significant advances in communication networks over the last few decades, smart cards have ...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
Recently, Chen et al. [B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication s...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...