Password authentication, which is widely used for authenticated method, also is important protocol by requiring a username and password before being allowed access to resources. In 2001, Lin et al. proposed the optimal strong-password authentication protocol, called (OSPA) which is a one-time password method by verifying with the different verifier every time for affirming its identity. However, Chen-Ku and Tsuji-Shimizu pointed respectively out that OSPA is vulnerable to the stolen-verifier attack and impersonation attack. In this paper, we shall propose the improved protocol secure against the known attacks to enhance the security
AbstractIn view of the low efficiency problem in the existing authentication protocols, the paper pr...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
[[abstract]]Password authentication, which is widely used for authenticated method, also is impor-ta...
[[abstract]]Password authentication is the most important and convenient protocol for verifying user...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
[[abstract]]A password-based mechanism is the most widely used method of authentication in distribut...
Password-based authentication protocols are currently the conventional authentication protocols in m...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
We discuss a password-based authentication protocol that we argue to be robust against password-gues...
Computer security is a field of computer science concerned with the control of risks related to comp...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
The hash function based Strong Password Authentication Protocol with User Anonymity (SPAPA) was desi...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
AbstractIn view of the low efficiency problem in the existing authentication protocols, the paper pr...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...
[[abstract]]Password authentication, which is widely used for authenticated method, also is impor-ta...
[[abstract]]Password authentication is the most important and convenient protocol for verifying user...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
[[abstract]]A password-based mechanism is the most widely used method of authentication in distribut...
Password-based authentication protocols are currently the conventional authentication protocols in m...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
We discuss a password-based authentication protocol that we argue to be robust against password-gues...
Computer security is a field of computer science concerned with the control of risks related to comp...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
The hash function based Strong Password Authentication Protocol with User Anonymity (SPAPA) was desi...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
AbstractIn view of the low efficiency problem in the existing authentication protocols, the paper pr...
[[abstract]]The security of a two-party authentication protocol relies on the stored secrets of each...
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentic...