[[abstract]]The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice over Internet protocol. However, most existing authentication schemes cannot protect the privacy of the user's identity. Therefore, the dynamic ID-based user authentication scheme is proposed to overcome this drawback. In this article, we analyze some security properties for recent dynamic ID-based user authentications. In addition, we propose an enhanced authentication scheme that can withstand the possible attacks and reduce the over...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
The rapid development of information and network technologies motivates the emergence of various new...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
With the significant advances in communication networks over the last few decades, smart cards have ...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
The rapid development of information and network technologies motivates the emergence of various new...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Abstract—Authentication is a major concern for accessing remote service residing over on server in a...
[[abstract]]Remote user authentication is an essential part in electronic commerce to identify legit...
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme ba...
Recently, with the appearance of smart cards, many user authentication protocols using smart card ha...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-bas...
With the significant advances in communication networks over the last few decades, smart cards have ...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID...
Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication sche...
Currently, smart card based remote user authentication schemes have been widely adopted due to their...
The rapid development of information and network technologies motivates the emergence of various new...