[[abstract]]With the current level of development of network technologies, various business activities take place on the Internet, and therefore how to assure the security of these activities over an insecure communication channel has become one of the most important issues. Authentication is the first step to protect users. Recently, Wang et al. proposed a remote user authentication scheme using smart cards to provide users with secure activities over an insecure Internet environment. Wang et al. claimed that their scheme is secured against guessing attacks, forgery attacks and denial of service (DoS) attacks which Ku et al.’s and Yoon et al.’s schemes suffered from. In this paper, we state that Wang et al.’s scheme is still vulnerable to ...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
[[abstract]]Authentication is a very important ingredient service for the network system to verify w...
99學年度洪文斌升等參考著作[[abstract]]Smart card-based applications have been widely used in e-commerce for year...
[[abstract]]Remote user authentication is a mechanism for validating users' legitimacy to access the...
Abstract. A remote user authentication system has become an important part of security, along with c...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
[[abstract]]Authentication is a very important ingredient service for the network system to verify w...
99學年度洪文斌升等參考著作[[abstract]]Smart card-based applications have been widely used in e-commerce for year...
[[abstract]]Remote user authentication is a mechanism for validating users' legitimacy to access the...
Abstract. A remote user authentication system has become an important part of security, along with c...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...