[[abstract]]In this paper, we provide a defense mechanism to Kim–Lee–Yoo’s ID-based password authentication scheme, which is vulnerable to impersonation attacks and resource exhaustion attacks. Mutual authentication and communication privacy are regarded as essential requirements in today’s client/server-based architecture; therefore, a lightweight but secure mutual authentication method is introduced in the proposed scheme. Once the mutual authentication is successful, the session key will be established without any further computation. The proposed defense mechanism not only accomplishes the mutual authentication and the session key establishment, but also inherits the security advantages of Kim–Lee–Yoo’s scheme, e.g. it is secure against...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]With the current level of development of network technologies, various business activiti...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
The rapid development of information and network technologies motivates the emergence of various new...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
[[abstract]]With the current level of development of network technologies, various business activiti...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
With its simplicity and feasibility, password-based remote user authentication becomes a popular way...
[[abstract]]In recent years, several password authentication schemes for remote login and verificati...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
The rapid development of information and network technologies motivates the emergence of various new...
Due to the rapid growth of computer networks and service provid-ing servers, many network environmen...
[[abstract]]Recently, Hwang and Li proposed a smartcard-based remote user authentication scheme. Lat...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
[[abstract]]Password authentication has been adopted as one of the most popular solutions in protect...