user identification, authentication, key agreement, anonymity, RSA, Denial-of-Service (DoS) attack Anonymity is a desirable security feature in addition to providing user identification and key agreement during a user’s login process. Recently, Yang et al., proposed an efficient user identification and key distribution protocol while preserving user anonymity. Their protocol addresses a weakness in the protocol proposed by Wu and Hsu. Unfortunately, Yang’s protocol poses a vulnerability that can be exploited to launch a Denial-of-Service (DoS) attack. In this paper, we cryptanalyze Yang’s protocol and present the DoS attack. We further secure their protocol by proposing a Secure Identification and Key agreement protocol with user Anonymity ...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authent...
[[abstract]]Password-based mechanism is the widely used method for user authentication. Many passwor...
Recently, Hsu and Chuang proposed an efficient user identification scheme with key preserving user a...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Apart from user identification and key distribution, it is very useful for the login process to achi...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
At present, a number of users employ an authentication protocol so as to enjoy protected electronic ...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authent...
[[abstract]]Password-based mechanism is the widely used method for user authentication. Many passwor...
Recently, Hsu and Chuang proposed an efficient user identification scheme with key preserving user a...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Apart from user identification and key distribution, it is very useful for the login process to achi...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
[[abstract]]Malicious intruders may launch as many invalid requests as possible without establishing...
An authentication protocol allows on-line service providers to validate the identity or legitimacy o...
At present, a number of users employ an authentication protocol so as to enjoy protected electronic ...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authent...
[[abstract]]Password-based mechanism is the widely used method for user authentication. Many passwor...