[[abstract]]User authentication and key agreement is an important security primitive for creating a securely distributed information system. Additionally, user authentication and key agreement is very useful for providing identity privacy to users. In this paper, we propose a robust and efficient user authentication and key agreement scheme using smart cards. The main merits include the following: 1) the computation and communication cost is very low; 2) there is no need for any password or verification table in the server; 3) a user can freely choose and change his own password; 4) it is a nonce-based scheme that does not have a serious time-synchronization problem; 5) servers and users can authenticate each other; 6) the server can revoke...
[[abstract]]For providing a secure distributed computer environment, efficient and flexible user aut...
[[abstract]]In a ubiquitous computing environment, a person can use various intelligent devices to o...
Abstract. We study the security requirements for remote authentication with password protected smart...
Smart card based password for authentication has become a common trend. Although smart card brings c...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
In this paper, we propose a cost effective mutual authentication scheme with key agree-ment using sm...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popul...
[[abstract]]In ubiquitous computing environments, people may obtain their services from application ...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
Abstract. A remote user authentication system has become an important part of security, along with c...
[[abstract]]For providing a secure distributed computer environment, efficient and flexible user aut...
[[abstract]]In a ubiquitous computing environment, a person can use various intelligent devices to o...
Abstract. We study the security requirements for remote authentication with password protected smart...
Smart card based password for authentication has become a common trend. Although smart card brings c...
[[abstract]]Public Key Cryptography (PKC) is recently playing an essential role in electronic bankin...
In this paper, we propose a cost effective mutual authentication scheme with key agree-ment using sm...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popul...
[[abstract]]In ubiquitous computing environments, people may obtain their services from application ...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number...
Abstract- Session key agreement protocol using smart card is extremely popular in client-server envi...
[[abstract]]The smart card-based scheme is a very promising and practical solution to remote authent...
Abstract. A remote user authentication system has become an important part of security, along with c...
[[abstract]]For providing a secure distributed computer environment, efficient and flexible user aut...
[[abstract]]In a ubiquitous computing environment, a person can use various intelligent devices to o...
Abstract. We study the security requirements for remote authentication with password protected smart...