Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceCommunication is necessary operations in wireless environments. Therefore, we must have a secure remote authentication to defend transactions against illegitimate adversaries in such risky channel. Smart card is one of methods that many schemes used due to its convenience. Recently, Khurram Khan has proposed an enhancement scheme using smart card to recover some pitfalls in Wang et al.’s scheme. They claimed that their scheme remedy those security flaws. Nevertheless, we point out that Khan et al.’s scheme cannot protect user’s anonymity. Besides, it does not achieve secret key forward secrecy and cannot resist denial of service attack due to ...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
With the significant advances in communication networks over the last few decades, smart cards have ...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceC...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
The security of a password authentication scheme using smart cards proposed by Khan et al. is analyz...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
With the significant advances in communication networks over the last few decades, smart cards have ...
Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceC...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communication...
Part 3: Network SecurityInternational audienceUnderstanding security failures of cryptographic proto...
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
The security of a password authentication scheme using smart cards proposed by Khan et al. is analyz...
Abstract. In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme usi...
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user o...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
Part 9: Short PapersInternational audienceRemote user authentication is important to identify whethe...
Part 4: Smart Cards Security (Short Papers)International audienceIn DBSec’11, Li et al. showed that ...
AbstractDue to the open environment, all network systems suffer from various security threats. The r...
Abstract: The security of a password authentication scheme using smart cards proposed by Khan et al....
With the significant advances in communication networks over the last few decades, smart cards have ...