[[abstract]]Recently, Shieh et al. have pointed out that Juang's password authenticated key agreement scheme and Chien et al.'s remote authentication scheme are vulnerable to some attacks. Therefore, they presented a modified protocol to avoid those attacks. However, the authors of this article shall show that Shieh et al.'s scheme and Juang's scheme have two weaknesses, respectively. Therefore, we shall improve the weaknesses of their schemes
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
[[abstract]]©2009 Asian Network for Scientific Information-This study will demonstrate both Juang`s ...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerabl...
Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerabl...
Hsu et al. [3] showed that the Ku-Wang [4] modified authentication key agreement scheme is vulnerabl...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
[[abstract]]Remote user authentication has become an essential part in e-commerce and mobile-commerc...
Recently, Chen et al. [B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication s...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
[[abstract]]Authentication is a very important ingredient service for the network system to verify w...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Summary. In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user au-then...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
[[abstract]]©2009 Asian Network for Scientific Information-This study will demonstrate both Juang`s ...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerabl...
Recently, Ku and Wang showed that Tseng’s modified authenticated key agreement protocol is vulnerabl...
Hsu et al. [3] showed that the Ku-Wang [4] modified authentication key agreement scheme is vulnerabl...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
[[abstract]]Remote user authentication has become an essential part in e-commerce and mobile-commerc...
Recently, Chen et al. [B. Chen, W. Kuo, L. Wuu, A secure password-based remote user authentication s...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
[[abstract]]Authentication is a very important ingredient service for the network system to verify w...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Summary. In 2012, Wen and Li proposed a secure and robust dynamic identity based remote user au-then...
Nowadays, we can easily obtain variety of services through networks. But due to the open environment...
Abstract—Remote user authentication always adopts the method of password to login the server within ...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...