In order to provide secure remote access control, a robust and efficient authentication protocol should realize mutual authentication and session key agreement between clients and the remote server over public channels. Recently, Chun-Ta Li proposed a password authentication and user anonymity protocol by using smart cards, and they claimed that their protocol has satisfied all criteria required by remote authentication. However, we have found that his protocol cannot provide mutual authentication between clients and the remote server. To realize ‘real’ mutual authentication, we propose a two-factor remote authentication protocol based on elliptic curve cryptography in this paper, which not only satisfies the criteria but also bears low com...
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
Recently, a password authentication and update scheme has been presented by Islam and Biswas to remo...
A password authentication scheme using smart card is called two-factor authentication scheme. Two-fa...
99學年度洪文斌升等參考著作[[abstract]]A complete remote authentication scheme should provide the following secur...
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement sc...
In this paper, we cryptanalyze Kim et al.’s scheme and point out several weaknesses in their scheme....
Abstract. A remote user authentication system has become an important part of security, along with c...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Being very resilient devices, smart cards have been commonly used for two-factor authentication sche...
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust n...
Recently, Wang-Wang have discussed a two birds with one stone: two-factor authentication with securi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
[[abstract]]With the current level of development of network technologies, various business activiti...
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
Recently, a password authentication and update scheme has been presented by Islam and Biswas to remo...
A password authentication scheme using smart card is called two-factor authentication scheme. Two-fa...
99學年度洪文斌升等參考著作[[abstract]]A complete remote authentication scheme should provide the following secur...
Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement sc...
In this paper, we cryptanalyze Kim et al.’s scheme and point out several weaknesses in their scheme....
Abstract. A remote user authentication system has become an important part of security, along with c...
Remote user authentication is a method, in which remote server verifies the legitimacy of a user ove...
Being very resilient devices, smart cards have been commonly used for two-factor authentication sche...
Secure and efficient mutual authentication and key agreement schemes form the basis for any robust n...
Recently, Wang-Wang have discussed a two birds with one stone: two-factor authentication with securi...
[[abstract]]Smart-card-based remote user password authentication schemes are commonly used for provi...
AbstractNowadays, we can easily obtain variety of services through networks. But due to the open env...
[[abstract]]With the current level of development of network technologies, various business activiti...
In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In ...
Smart card based remote user password authentication schemes are one of the user-friendly and scalab...
Recently, a password authentication and update scheme has been presented by Islam and Biswas to remo...