AbstractIn 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first scheme is a security improvement of Liao et al.'s scheme and the second scheme is a security improvement of Wang et al.'s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find that both schemes have security flaws. In addition, their schemes require a verification table and time-synchronization, making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws of Sood et al.'s schemes, we propose a robust scheme which resists the well-known attacks and achieves all the desirable security goals
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
Dynamic ID based authentication scheme is more and more important in insecure wireless environment a...
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The firs...
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which ...
[[abstract]]Recently, Lee et al. proposed a secure dynamic ID based remote user authentication schem...
En el año 2010, Sood-Sarje-Singh propusieron dos esquemas de autenticación de usuario remoto. El pri...
AbstractRecently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote u...
[[abstract]]©2008 Elsevier-Recently, Liao and Wang proposed a secure dynamic ID based remote user au...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The au...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
Dynamic ID based authentication scheme is more and more important in insecure wireless environment a...
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The firs...
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which ...
[[abstract]]Recently, Lee et al. proposed a secure dynamic ID based remote user authentication schem...
En el año 2010, Sood-Sarje-Singh propusieron dos esquemas de autenticación de usuario remoto. El pri...
AbstractRecently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote u...
[[abstract]]©2008 Elsevier-Recently, Liao and Wang proposed a secure dynamic ID based remote user au...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The au...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
Dynamic ID based authentication scheme is more and more important in insecure wireless environment a...