메뉴 건너뛰기




Volumn 49, Issue 2, 2003, Pages 414-416

A modified remote user authentication scheme using smart cards

Author keywords

Authentication; Cryptography; Password; Security

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMMUNICATION CHANNELS (INFORMATION THEORY); FUNCTIONS; SECURITY OF DATA; SMART CARDS;

EID: 0042196051     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2003.1209534     Document Type: Article
Times cited : (246)

References (16)
  • 1
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, pp. 992-993, 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , pp. 992-993
    • Chan, C.K.1    Cheng, L.M.2
  • 3
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • May
    • C. C. Chang and T. C. Wu, "Remote password authentication with smart cards," IEE Proceedings-E, vol. 138, no. 3, pp. 165-168, May, 1991.
    • (1991) IEE Proceedings-E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 4
    • 0041698519 scopus 로고
    • Efficient digital public-key signatures with shadow
    • L. Guillou and J. J. Quisquater, "Efficient digital public-key signatures with shadow," Advances in Cryptology, CRYPT'87, vol. LNCS 239, pp. 238, 1987.
    • (1987) Advances in Cryptology, CRYPT'87 , vol.LNCS239 , pp. 238
    • Guillou, L.1    Quisquater, J.J.2
  • 5
    • 0345270373 scopus 로고
    • A paradoxical identity-based signature scheme resulting from zero-knowledge
    • L. Guillou and J. J. Quisquater, "A Paradoxical identity-based signature scheme resulting from zero-knowledge," Advances in Cryptology, CRYPT'88, vol. LNCS 430, pp. 216-231, 1988.
    • (1988) Advances in Cryptology, CRYPT'88 , vol.LNCS430 , pp. 216-231
    • Guillou, L.1    Quisquater, J.J.2
  • 6
    • 0032669728 scopus 로고    scopus 로고
    • Cryptanalysis of remote login authentication scheme
    • M. S. Hwang, "Cryptanalysis of remote login authentication scheme," Computer Communications, vol. 22, no. 8, pp. 742-744, 1999.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 742-744
    • Hwang, M.S.1
  • 7
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • M. S. Hwang, "A remote password authentication scheme based on the digital signature method," International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
    • (1999) International Journal of Computer Mathematics , vol.70 , pp. 657-666
    • Hwang, M.S.1
  • 8
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • M. S. Hwang, C. C. Lee, and Y. L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack," International Journal of Informatica, vol. 12, no. 2, pp. 297-302, 2001.
    • (2001) International Journal of Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 9
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 28-30, 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 10
    • 0041698518 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • C. C. Lee, M. S. Hwang, and W. P. Yang, "A flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.3 , pp. 46-52
    • Lee, C.C.1    Hwang, M.S.2    Yang, W.P.3
  • 11
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • C. C. Lee, L. H. Li, and M. S. Hwang, "A remote user authentication scheme using hash functions," ACM Operating Systems Review, vol. 36, no. 4, pp. 23-39, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 12
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • L. H. Li, I. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multi-server architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001.
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 14
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol. 19, no. 5, pp. 466-469, 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 15
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way function much harder to crack
    • M. Udi, "A simple scheme to make passwords based on one-way function much harder to crack," Computers & Security, vol. 15, no. 2, pp. 171-176, 1996.
    • (1996) Computers & Security , vol.15 , Issue.2 , pp. 171-176
    • Udi, M.1
  • 16
    • 0029535942 scopus 로고
    • Remote login authentication scheme based on a geometric approach
    • T. C. Wu, "Remote login authentication scheme based on a geometric approach," Computer Communications, vol. 18, no. 12, pp. 959-963, 1995.
    • (1995) Computer Communications , vol.18 , Issue.12 , pp. 959-963
    • Wu, T.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.