In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered by a random value before transferred to the AS. Besides, the card-specific key is coded in the header of the root file to lock the whole information of the smart card. The authentication server, after being successfully verified by the smart card, can access this information and verify the identity of smart card. Our security analysis indicates th...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Abstract. We study the security requirements for remote authentication with password protected smart...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]In a ubiquitous computing environment, a person can use various intelligent devices to o...
Smart card based password for authentication has become a common trend. Although smart card brings c...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractOne of the most commonly used two-factor user authentication mechanisms nowadays is based on...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Abstract. We study the security requirements for remote authentication with password protected smart...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]In a ubiquitous computing environment, a person can use various intelligent devices to o...
Smart card based password for authentication has become a common trend. Although smart card brings c...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractOne of the most commonly used two-factor user authentication mechanisms nowadays is based on...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...