In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the forgery attack. So in 2005, Yang and Wang proposed an improvement of Yang and Shieh’s schemes to resist against Sun and Yeh’s attack. However in this paper, we will point out that Yang and Wang’s schemes still suffer from the forgery attack. Because in their schemes, one can masquerade as a legal user and cheat the remote server successfully in the authentication phase
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
Yeh et al., in 2002, proposed a one-time password authentication scheme using smart cards. Subsequen...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
[[abstract]]How to develop an efficient and secure authentication protocol has been a hot research t...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
Yeh et al., in 2002, proposed a one-time password authentication scheme using smart cards. Subsequen...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
The intent of this paper is to propose an efficient timestamp-based password authentication scheme u...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
[[abstract]]How to develop an efficient and secure authentication protocol has been a hot research t...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based pass...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Password authentication has been adopted as one of the most commonly used solutions in network envir...