Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communications in such networks need to be guarded. It is necessary to have a secure mutual authentication scheme to defend transactions between user and service provider against illegitimate adversaries. Especially, users are those vulnerable to attacks and there are many authentication schemes with smart-card proposed to protect them. Recently, Yung-Cheng Lee has suggested a dynamic identity based user authentication scheme to resist smart-card-theft attack. Nevertheless, he assumed that smart-card is tamperproof. In our opinion, this is not appropriate because Kocher and Messerges pointed that smart-card’s confidential information could be extracted by...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
With the significant advances in communication networks over the last few decades, smart cards have ...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceC...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
With the significant advances in communication networks over the last few decades, smart cards have ...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceC...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Password authentication has been adopted as one of the most commonly used solutions in network envir...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
With the significant advances in communication networks over the last few decades, smart cards have ...