메뉴 건너뛰기




Volumn 50, Issue 1, 2004, Pages 204-207

Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards

Author keywords

Password; Reflection attack; Remote user authentication; Reparability; Smart card

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; SECURITY OF DATA; SERVERS; SHIFT REGISTERS;

EID: 1942423677     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2004.1277863     Document Type: Article
Times cited : (261)

References (15)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communication of ACM, vol. 24, pp. 77-771, 1981.
    • (1981) Communication of ACM , vol.24 , pp. 77-771
    • Lamport, L.1
  • 2
    • 0019579253 scopus 로고
    • Cryptographic authentication of time-invariant quanities
    • R. E. Lennon, S. M. Matyas, and C. H. Mayer, "Cryptographic authentication of time-invariant quanities," IEEE Trans. Commun., COM-29, no. 6, pp. 773-777, 1981.
    • (1981) IEEE Trans. Commun. , vol.COM-29 , Issue.6 , pp. 773-777
    • Lennon, R.E.1    Matyas, S.M.2    Mayer, C.H.3
  • 3
    • 0024715186 scopus 로고
    • Limitations of challenge-response entity authentication
    • Aug.
    • C. Mitchell, "Limitations of challenge-response entity authentication," Electronics Letters, vol. 25, no. 17, pp. 1195-1196, Aug. 1989.
    • (1989) Electronics Letters , vol.25 , Issue.17 , pp. 1195-1196
    • Mitchell, C.1
  • 4
    • 0000873739 scopus 로고
    • Reparable key distribution protocols for internet environments
    • May
    • T. Hwang and W. C. Ku, "Reparable key distribution protocols for internet environments," IEEE Trans. Commun., vol. 43, no. 5, pp. 1947-1950, May 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.5 , pp. 1947-1950
    • Hwang, T.1    Ku, W.C.2
  • 5
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • Oct.
    • C. J. Mitchell and L. Chen, "Comments on the S/KEY user authentication scheme," ACM Operating System Review, vol. 30, no. 4, pp. 12-16, Oct. 1996.
    • (1996) ACM Operating System Review , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 6
    • 0003256983 scopus 로고    scopus 로고
    • Shared authentication token secure against replay and weak key attack
    • S. M. Yen, and K. H. Liao, "Shared authentication token secure against replay and weak key attack," Information Processing Letters, pp. 78-80, 1997.
    • (1997) Information Processing Letters , pp. 78-80
    • Yen, S.M.1    Liao, K.H.2
  • 8
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart card
    • Feb.
    • M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart card," IEEE Trans. on Consumer Electron., vol. 46, no. 1, pp. 28-30, Feb. 2000.
    • (2000) IEEE Trans. on Consumer Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 9
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • Nov.
    • C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electron., vol. 46, no. 4, pp. 992-993, Nov. 2000.
    • (2000) IEEE Trans. on Consumer Electron. , vol.46 , Issue.4 , pp. 992-993
    • Chan, C.K.1    Cheng, L.M.2
  • 10
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Nov.
    • H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Trans. on Consumer Electron., vol. 46, no. 4, pp. 958-961, Nov. 2000.
    • (2000) IEEE Trans. on Consumer Electron. , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 12
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 13
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. on Computers, vol. 51, no. 5, pp. 541-552, May 2002.
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 14
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • May
    • W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Trans. Commun., vol. E86-B, no. 5, pp. 1682-1684, May 2003.
    • (2003) IEICE Trans. Commun. , vol.E86-B , Issue.5 , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 15
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • May
    • J. J. Shen, C. W. Lin, M. S. Hwang, "A modified remote user authentication scheme using smart cards", IEEE Trans. on Consumer Electron., vol. 49, no. 2, pp. 414-416, May 2003.
    • (2003) IEEE Trans. on Consumer Electron. , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.