[[abstract]]Recently, Lee et al. proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. They claimed their scheme can remedy the weaknesses of prior schemes and is thus more effective. However, we find Lee et al.'s scheme still fails to achieve the anonymity and has the security weakness of a smart card clone. In this article, we shall propose a new scheme to improve Lee et al.’s scheme. Our scheme not only overcomes the weaknesses of Lee et al.'s scheme, but also maintains a high efficiency standar
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
[[abstract]]©2008 Elsevier-Recently, Liao and Wang proposed a secure dynamic ID based remote user au...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
AbstractIn 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. ...
AbstractRecently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote u...
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The firs...
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which ...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...
[[abstract]]Recently, Hsiang et al. pointed out that Liao-Wang’s dynamic ID based remote user authen...
[[abstract]]©2008 Elsevier-Recently, Liao and Wang proposed a secure dynamic ID based remote user au...
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
AbstractIn 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. ...
AbstractRecently, Wang, Liu, Xiao and Dan proposed an efficient and secure dynamic ID-based remote u...
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The firs...
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which ...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a r...