[[abstract]]Recently, Zhu et al. proposed an password-based authenticated key exchange protocol based on RSA such that it is efficient enough to be implemented on most of the target low-power devices such as smart cards and low-power Personal Digital Assistants in wireless networks. They claimed that the proposed scheme is secure against dictionary attacks. In this paper, we show that the scheme proposed by Zhu et al. is insecure against undetectable on-line password guessing attacks. Furthermore, we examine Zhu et al.'s protocol and find that Zhu et al.'s protocol does not achieve explicit key authentication. An improved version is then proposed to defeat the undetectable on-line password guessing attacks and also provide explicit key auth...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
[[abstract]]In a client-server network environment, a mutual authentication and key exchange scheme ...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Abstract. Yeh et al. recently proposed a password-based authenticated key exchange protocol based on...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
In 2011, Eissa, Razak and Ngadi proposed a lightweight authentication and encryption scheme to enhan...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]Designing authenticated key exchange protocols for portable devices to secure communicat...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
[[abstract]]In a client-server network environment, a mutual authentication and key exchange scheme ...
In 2002, Zhu et al. proposed a password authenticated key exchange protocol based on RSA such that i...
Abstract. Yeh et al. recently proposed a password-based authenticated key exchange protocol based on...
1 Introduction Classical symmetric key based authenticated key exchange protocols dictate the shared...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
[[abstract]]Recently, Parks et al. proposed an authentication and key agreement protocol for low-pow...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encry...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
In 2011, Eissa, Razak and Ngadi proposed a lightweight authentication and encryption scheme to enhan...
[[abstract]]In recent years, several user authentication schemes with smart cards for wireless commu...
[[abstract]]Designing authenticated key exchange protocols for portable devices to secure communicat...
[[abstract]]The password-authenticated key exchange (PAKE) is an important tool to secure wireless c...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
[[abstract]]In a client-server network environment, a mutual authentication and key exchange scheme ...