[[abstract]]Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show that the secrets stored in the card can be extracted by monitoring its power consumption. Therefore, Kim et al.’s scheme fail to resist smart card security breach. As the main contribution of this paper, a robust remote user authentication scheme against smart card security breach is presented, while keeping the merits of the well-known sma...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
Abstract. A remote user authentication system has become an important part of security, along with c...
[[abstract]]"In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for s...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Abstract. We study the security requirements for remote authentication with password protected smart...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
Abstract. A remote user authentication system has become an important part of security, along with c...
[[abstract]]"In 2008, Yoon et al. [25] presented three kinds of security attacks (YLY attacks for s...
Abstract. Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remo...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
Abstract. We study the security requirements for remote authentication with password protected smart...