We propose a slmple and secure user authentication method with the help of slmple memory devices such as magnetic cards. In this method, user's password is divided into two pieces; one is kept in the user's mind and the other is stored in the memory device. The original password is recoistructed if and only if both of them are presented. The contents of the memory device are encrypted so that the robbery of the card does not effect to the security of the method. Furthermore, the contents of the device are changed in every session, which makes the method robust against replay attacks and minimizes the damage of the user in case of an emergency. Using this method, we can easily overcome the problem of impersonation of an intruder caused by ne...
99學年度洪文斌升等參考著作[[abstract]]Recently, Rhee et al. proposed a remote user authentication scheme using a...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Open authentication protocols have become a standard solution to allow interfacing of third-party ap...
Abstract. We study the security requirements for remote authentication with password protected smart...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
<div><p>The traditional username/password or PIN based authentication scheme, which still remains th...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authent...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
[[abstract]]With the current level of development of network technologies, various business activiti...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
Abstract. A remote user authentication system has become an important part of security, along with c...
Electronic authentication with a portable device such as a smart card has been receiving increasing ...
[[abstract]]In this article, we propose a simple remote user authentication scheme using smart cards...
99學年度洪文斌升等參考著作[[abstract]]Recently, Rhee et al. proposed a remote user authentication scheme using a...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Open authentication protocols have become a standard solution to allow interfacing of third-party ap...
Abstract. We study the security requirements for remote authentication with password protected smart...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Part 12: Authentication and DelegationInternational audienceWe study the security requirements for r...
<div><p>The traditional username/password or PIN based authentication scheme, which still remains th...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authent...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
[[abstract]]With the current level of development of network technologies, various business activiti...
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, us...
Abstract. A remote user authentication system has become an important part of security, along with c...
Electronic authentication with a portable device such as a smart card has been receiving increasing ...
[[abstract]]In this article, we propose a simple remote user authentication scheme using smart cards...
99學年度洪文斌升等參考著作[[abstract]]Recently, Rhee et al. proposed a remote user authentication scheme using a...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Open authentication protocols have become a standard solution to allow interfacing of third-party ap...