메뉴 건너뛰기




Volumn 24, Issue 8, 2005, Pages 619-628

Robust remote authentication scheme with smart cards

Author keywords

Cryptology; Information security; Login; Remote authentication; Smart cards

Indexed keywords

COMPUTATION THEORY; COMPUTER SOFTWARE PORTABILITY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; SYNCHRONIZATION;

EID: 28044451335     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.03.006     Document Type: Article
Times cited : (150)

References (32)
  • 2
    • 0345764840 scopus 로고    scopus 로고
    • Attacks on the (enhanced) Yang-Shieh authentication
    • K.F. Chen, and S. Zhong Attacks on the (enhanced) Yang-Shieh authentication Computers and Security 22 8 2003 725 727
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 725-727
    • Chen, K.F.1    Zhong, S.2
  • 3
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.Y. Chien, J.K. Jan, and Y.M. Tseng An efficient and practical solution to remote authentication: smart card Computers and Security 21 4 2002 372 375
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 4
    • 0016092372 scopus 로고
    • A user authentication system not requiring secrecy in the computer
    • A.J. Evan, W. Kantrowitz, and E. Weiss A user authentication system not requiring secrecy in the computer Communications of ACM 17 1974 437 442
    • (1974) Communications of ACM , vol.17 , pp. 437-442
    • Evan, A.J.1    Kantrowitz, W.2    Weiss, E.3
  • 5
    • 1542542682 scopus 로고    scopus 로고
    • Security of two remote authentication schemes using smart cards
    • C.L. Hsu Security of two remote authentication schemes using smart cards IEEE Transactions on Consumer Electronics 49 4 2003 1196 1198
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.4 , pp. 1196-1198
    • Hsu, C.L.1
  • 6
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M.S. Hwang, and L.H. Li A new remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 46 1 2000 28 30
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 8
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • W.S. Juang Efficient password authenticated key agreement using smart cards Computers and Security 23 2 2004 167 173
    • (2004) Computers and Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.S.1
  • 11
    • 1942423677 scopus 로고    scopus 로고
    • Weakness and improvements of an efficient password based remote user authentication scheme using smart cards
    • W.C. Ku, and S.H. Chen Weakness and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.H.2
  • 12
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport Password authentication with insecure communication Communications of ACM 24 1981 28 30
    • (1981) Communications of ACM , vol.24 , pp. 28-30
    • Lamport, L.1
  • 13
    • 0041698517 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • C.C. Lee, M.S. Hwang, and W.P. Yang A flexible remote user authentication scheme using smart cards ACM Operating Systems Review 36 4 2002 23 29
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Hwang, M.S.2    Yang, W.P.3
  • 15
    • 23444455451 scopus 로고    scopus 로고
    • Security enhancement for optimal strong-password authentication protocol
    • C.W. Lin, J.J. Shen, and M.S. Hwang Security enhancement for optimal strong-password authentication protocol ACM Operating Systems Review 37 3 2003 12 16
    • (2003) ACM Operating Systems Review , vol.37 , Issue.3 , pp. 12-16
    • Lin, C.W.1    Shen, J.J.2    Hwang, M.S.3
  • 17
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Communications of the ACM 21 12 1978 993 999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 20
    • 0022807029 scopus 로고
    • A simple and fast probabilistic algorithm for computing square roots modulo a prime number
    • R.C. Peralta A simple and fast probabilistic algorithm for computing square roots modulo a prime number IEEE Transactions on Information Theory 32 6 1986 846 847
    • (1986) IEEE Transactions on Information Theory , vol.32 , Issue.6 , pp. 846-847
    • Peralta, R.C.1
  • 21
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorizations
    • MIT Lab., Computer Science Cambridge, Mass
    • M.O. Rabin Digitalized signatures and public-key functions as intractable as factorizations Technical Report January 1979 MIT Lab., Computer Science Cambridge, Mass MIT/LCS/TR212
    • (1979) Technical Report
    • Rabin, M.O.1
  • 22
    • 2742584770 scopus 로고    scopus 로고
    • An authentication protocol and key distribution system for open network system
    • S.P. Shieh, and W.H. Yang An authentication protocol and key distribution system for open network system ACM Operating Systems Review 30 2 1996 32 41
    • (1996) ACM Operating Systems Review , vol.30 , Issue.2 , pp. 32-41
    • Shieh, S.P.1    Yang, W.H.2
  • 23
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • H.M. Sun An efficient remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 46 4 2000 958 961
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 24
    • 0032676908 scopus 로고    scopus 로고
    • Remote password authentication scheme based on cross-product
    • K. Tan, and H. Zhu Remote password authentication scheme based on cross-product Computer Communications 22 4 1999 390 393
    • (1999) Computer Communications , vol.22 , Issue.4 , pp. 390-393
    • Tan, K.1    Zhu, H.2
  • 25
    • 0029710130 scopus 로고    scopus 로고
    • Smart card based secure password authentication scheme
    • S.J. Wang, and J.F. Chang Smart card based secure password authentication scheme Computers and Security 15 3 1996 231 237
    • (1996) Computers and Security , vol.15 , Issue.3 , pp. 231-237
    • Wang, S.J.1    Chang, J.F.2
  • 26
    • 0042697291 scopus 로고    scopus 로고
    • Yet another log-in authentication using N-dimensional construction based on circle property
    • S.J. Wang Yet another log-in authentication using N-dimensional construction based on circle property IEEE Transactions on Consumer Electronics 49 2 2003 337 341
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.2 , pp. 337-341
    • Wang, S.J.1
  • 27
    • 0029535942 scopus 로고
    • Remote login authentication scheme based on a geometric
    • T.C. Wu Remote login authentication scheme based on a geometric Computer Communications 18 12 1995 959 963
    • (1995) Computer Communications , vol.18 , Issue.12 , pp. 959-963
    • Wu, T.C.1
  • 28
    • 0142007144 scopus 로고    scopus 로고
    • A user friendly remote authentication scheme with smart cards
    • S.T. Wu, and B.C. Chieu A user friendly remote authentication scheme with smart cards Computers and Security 22 6 2003 547 550
    • (2003) Computers and Security , vol.22 , Issue.6 , pp. 547-550
    • Wu, S.T.1    Chieu, B.C.2
  • 29
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • W.H. Yang, and S.P. Shieh Password authentication schemes with smart cards Computers and Security 18 8 1999 727 733
    • (1999) Computers and Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2
  • 30
    • 3042731523 scopus 로고    scopus 로고
    • Cryptanalysis of a user friendly remote authentication scheme with smart cards
    • C.C. Yang, and R.C. Wang Cryptanalysis of a user friendly remote authentication scheme with smart cards Computers and Security 23 5 2004 425 427
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 425-427
    • Yang, C.C.1    Wang, R.C.2
  • 31
    • 0035508197 scopus 로고    scopus 로고
    • Security analysis of the generalized key agreement and password authentication protocol
    • H.T. Yeh, H.M. Sun, and T. Hwang Security analysis of the generalized key agreement and password authentication protocol IEEE Communications Letters 5 11 2001 462 463
    • (2001) IEEE Communications Letters , vol.5 , Issue.11 , pp. 462-463
    • Yeh, H.T.1    Sun, H.M.2    Hwang, T.3
  • 32
    • 0003256983 scopus 로고    scopus 로고
    • Shared authentication token secure against replay and weak key attacks
    • S.M. Yen, and K.H. Liao Shared authentication token secure against replay and weak key attacks Information Processing Letters 62 2 1997 78 80
    • (1997) Information Processing Letters , vol.62 , Issue.2 , pp. 78-80
    • Yen, S.M.1    Liao, K.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.