We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server. In this paper, we will focus on the password based authentication between a smart card owner and smart card via an untrusted card reader. In a typical scenario, a smart card owner inserts the smart card into an untrusted card reader and input the password via the card reader in order for the smart card to carry out the process of authentication with a remote server. In this case, we want to guarantee that the card reader will not be ...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Being very resilient devices, smart cards have been commonly used for two-factor authentication sche...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]"In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for s...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
[[abstract]]Remote user authentication is important to identify whether communicating parties are ge...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Being very resilient devices, smart cards have been commonly used for two-factor authentication sche...
Abstract. A remote user authentication system has become an important part of security, along with c...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]"In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for s...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...