99學年度洪文斌升等參考著作[[abstract]]A complete remote authentication scheme should provide the following security properties: (1) mutual authentication, (2) session key exchange, (3) protection of user anonymity, (4) support of immediate revocation capability, (5) low communication and computation cost, (6) resistance to various kinds of attacks, (7) freely choosing and securely changing passwords by users, and (8) without storing password or verification tables in servers. However, none of the existing schemes meets all the requirements. In this paper, along the line of cost effective approach using hash functions for authentication, we propose an efficient and practical remote user authentication scheme with smart cards to support the above complet...
[[abstract]]Based on the discrete logarithm problem, Hwang and Li proposed a remote user authenticat...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In remote authentication scheme, a remote user can communicate with server over open networks even t...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractA remote password authentication scheme is a mechanism used to support a computer system to ...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
[[abstract]]In this article, we propose a simple remote user authentication scheme using smart cards...
[[abstract]]In 1999, Hwang and Li proposed a new user authentication scheme using smart cards. The s...
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and...
This paper proposes a novel remote user authentication scheme using smart cards which allows both th...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
[[abstract]]Based on the discrete logarithm problem, Hwang and Li proposed a remote user authenticat...
With the significant advances in communication networks over the last few decades, smart cards have ...
[[abstract]]Based on the discrete logarithm problem, Hwang and Li proposed a remote user authenticat...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In remote authentication scheme, a remote user can communicate with server over open networks even t...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractA remote password authentication scheme is a mechanism used to support a computer system to ...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
[[abstract]]In this article, we propose a simple remote user authentication scheme using smart cards...
[[abstract]]In 1999, Hwang and Li proposed a new user authentication scheme using smart cards. The s...
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and...
This paper proposes a novel remote user authentication scheme using smart cards which allows both th...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
[[abstract]]Based on the discrete logarithm problem, Hwang and Li proposed a remote user authenticat...
With the significant advances in communication networks over the last few decades, smart cards have ...
[[abstract]]Based on the discrete logarithm problem, Hwang and Li proposed a remote user authenticat...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In remote authentication scheme, a remote user can communicate with server over open networks even t...