메뉴 건너뛰기




Volumn 4158 LNCS, Issue , 2006, Pages 418-427

Remote authentication with forward security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COPYRIGHTS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SERVERS; USER INTERFACES;

EID: 33750073819     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11839569_40     Document Type: Conference Paper
Times cited : (1)

References (38)
  • 2
    • 1542647564 scopus 로고    scopus 로고
    • A remote user authentication scheme using smart cards with forward secrecy
    • Awasthi,A.K., Lal,S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consum. Electron. Vol. 49 (4) (2003) 1246-1248
    • (2003) IEEE Trans. Consum. Electron. , vol.49 , Issue.4 , pp. 1246-1248
    • Awasthi, A.K.1    Lal, S.2
  • 3
    • 33645310462 scopus 로고    scopus 로고
    • A secure and efficient strong-password authentication protocol
    • Chang,Y.F., Chang,C.C.: A secure and efficient strong-password authentication protocol. ACM SIGOPS Operating Systems Review. Vol. 38(3)(2004)79-90
    • (2004) ACM SIGOPS Operating Systems Review , vol.38 , Issue.3 , pp. 79-90
    • Chang, Y.F.1    Chang, C.C.2
  • 4
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • Chan,C.K., Cheng,L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46 (4) (2000) 992-993
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.4 , pp. 992-993
    • Chan, C.K.1    Cheng, L.M.2
  • 6
    • 0344197994 scopus 로고    scopus 로고
    • Some forgery attacks on a remote user authentication scheme using smart cards
    • Chan,C.C., Hwang,K.F.: Some forgery attacks on a remote user authentication scheme using smart cards. Informatics. Vol. 14 (3)(2003) 289-294
    • (2003) Informatics , vol.14 , Issue.3 , pp. 289-294
    • Chan, C.C.1    Hwang, K.F.2
  • 7
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien,H.Y., Jan,J., Tseng,Y.: An efficient and practical solution to remote authentication: smart card. Computer Security. Vol. 21 (4)(2002) 372-375
    • (2002) Computer Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.2    Tseng, Y.3
  • 8
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • Hsu,C.L.: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Inerfaces. Vol. 26(3) (2004) 167-169
    • (2004) Computer Standards and Inerfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 9
    • 9544227377 scopus 로고    scopus 로고
    • Improvement of Chien et al.'s remote user authentication scheme using smart cards
    • Lee,S.W., Kim,H.S., Yoo,K.Y.: Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Inerfaces. Vol. 27 (2005)181-183
    • (2005) Computer Standards and Inerfaces , vol.27 , pp. 181-183
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 10
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • Chang,C.C., Wu,T.C.: Remote password authentication with smart cards,IEE Proceddings-E.Vol. 138 (3)(1993)165-168
    • (1993) IEE Proceddings-E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 11
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • Das,M.L., Saxena,A., Gulati,V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. Vol. 50 (2)(2004)629-631
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 12
    • 0037008805 scopus 로고    scopus 로고
    • A simple remote user authentication scheme
    • Hwang,M.S., Lee,C.C., Tang,Y.L.: A simple remote user authentication scheme. Math.Comput.Model. Vol. 36(2002) 103-107
    • (2002) Math.Comput.Model. , vol.36 , pp. 103-107
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 13
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang,M.S., Li,L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consuni. Electron. Vol. 46 (1)(2000)28-30
    • (2000) IEEE Trans. Consuni. Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 14
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport,L.: Password authentication with insecure communication. Communication of ACM Vol. 24 (11)(1981) 770-772
    • (1981) Communication of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 15
    • 24344478593 scopus 로고    scopus 로고
    • Efficient remote user authentication scheme using smart card
    • Lu,R.X., Cao,Z.F.: Efficient remote user authentication scheme using smart card. Computer Networks. Vol. 49(4) (2005) 535-540
    • (2005) Computer Networks , vol.49 , Issue.4 , pp. 535-540
    • Lu, R.X.1    Cao, Z.F.2
  • 16
    • 1542542636 scopus 로고    scopus 로고
    • Cryptanalysis of a modified remote user authentication scheme using smart cards
    • Leung,K.C., Cheng,L.M., Fong,A.S., Chan,C.K.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 49 (4) (2003) 1243-1245
    • (2003) IEEE Trans. Consum. Electron. , vol.49 , Issue.4 , pp. 1243-1245
    • Leung, K.C.1    Cheng, L.M.2    Fong, A.S.3    Chan, C.K.4
  • 17
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Sun,H.M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 46 (4)(2000) 958-961
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 18
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • Shen,J.J., Lin,C.W., Hwang,M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. Vol. 49 (2)(2003) 414-416
    • (2003) IEEE Trans. Consum. Electron. , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 19
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart card
    • Yang,W.H., Shieh,S.P.: Password authentication schemes with smart card. Computer Security. Vol. 18 (8) (1999) 727-733
    • (1999) Computer Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2
  • 20
    • 0036167785 scopus 로고    scopus 로고
    • Cryptanalysis of timestamp-based password authenticatin scheme
    • Chan,C.K., Cheng,L.M.: Cryptanalysis of timestamp-based password authenticatin scheme. Computers & Security. Vol. 21(1)(2002)74-76
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 74-76
    • Chan, C.K.1    Cheng, L.M.2
  • 21
    • 0036429021 scopus 로고    scopus 로고
    • An enhancement of timestamp-based password authenticatin scheme
    • Fan,L., Li,J.H., Zhu,H.W.: An enhancement of timestamp-based password authenticatin scheme. Computers & Security. Vol. 21(7)(2002)665-667
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 665-667
    • Fan, L.1    Li, J.H.2    Zhu, H.W.3
  • 22
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • Shen,J.J., Lin,C.W., Hwang,M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security. Vol. 22(7)(2003)591-595
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 23
    • 0142007144 scopus 로고    scopus 로고
    • A user friendly remote authentication scheme with smart cards
    • Wu,S.T., Chieu,B.C.: A user friendly remote authentication scheme with smart cards. Computers & Security. Vol. 22(6)(2003)547-550
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 547-550
    • Wu, S.T.1    Chieu, B.C.2
  • 24
    • 3042731523 scopus 로고    scopus 로고
    • Cryptanalysis of a user friendly remote authentication scheme with smart cards
    • Yang,C.C., Wang,R.C.: Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computers & Security. Vol. 23(2004)425-427
    • (2004) Computers & Security , vol.23 , pp. 425-427
    • Yang, C.C.1    Wang, R.C.2
  • 25
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocal
    • Chen,C.M., Ku,W.C.: Stolen-verifier attack on two new strong-password authentication protocal. IEICE Transactions on Communications. Vol. E85-B,(11)(2002)2519-2521
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.11 , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 26
    • 0032115203 scopus 로고    scopus 로고
    • Efficient and secure password-based authentication protocols against guessing atacks
    • Kwon,T., Song,J.: Efficient and secure password-based authentication protocols against guessing atacks. Computer Communications. 21(1998)853-861.
    • (1998) Computer Communications , vol.21 , pp. 853-861
    • Kwon, T.1    Song, J.2
  • 27
    • 84937438236 scopus 로고    scopus 로고
    • Threshold password-authentication key exchange
    • CRYPTO 2002. Berlin: Spring-Verlag
    • MacKenzie,P., Shrimpton,T., Jakobsson,M.: Threshold password- authentication key exchange, CRYPTO 2002, LNCS, Vol. 2442. Berlin: Spring-Verlag. 385-400.
    • LNCS , vol.2442 , pp. 385-400
    • MacKenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 28
    • 35248822669 scopus 로고    scopus 로고
    • Provably secure threshold password authenticated key exchange
    • Eurocrypt 2003, Springer-Verlag
    • Raimonodo,M.D., Gennaro,R.: Provably secure threshold password authenticated key exchange. In: Eurocrypt 2003, LNCS, vol 2656, Springer-Verlag
    • LNCS , vol.2656
    • Raimonodo, M.D.1    Gennaro, R.2
  • 29
    • 33750070723 scopus 로고    scopus 로고
    • Factoring-based proxy signature schemes with forward-security
    • CIS 2004, Shanghai
    • Chai,Z.C., Cao,Z.F.: Factoring-Based Proxy Signature Schemes with Forward-Security. CIS 2004, Shanghai, Lecture Notes in Computer Science, Vol. 3314, (2004) 1034-1040
    • (2004) Lecture Notes in Computer Science , vol.3314 , pp. 1034-1040
    • Chai, Z.C.1    Cao, Z.F.2
  • 30
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol
    • Advances in Cryptology EUROCRYPT89, Berlin: Spring-Verlag
    • Gunther, C. G.: An Identity-based Key-exchange Protocol. Advances in Cryptology EUROCRYPT89, LNCS, Vol. 434,Berlin: Spring-Verlag,(1990) 29-37
    • (1990) LNCS , vol.434 , pp. 29-37
    • Gunther, C.G.1
  • 31
    • 84941159682 scopus 로고    scopus 로고
    • Forward-secure threshold signature scheme
    • Abdalla,M., Miner, S., et al.: Forward-secure Threshold Signature Scheme. RSA'01
    • RSA'01
    • Abdalla, M.1    Miner, S.2
  • 33
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Advances in Cryptology Crypto'99 Proceedings, Wiener, M. ed., Springer-Verlag
    • Bellare, M., Miner, S.: A forward-secure digital signature scheme. Advances in Cryptology Crypto'99 Proceedings, Lecture Notes in Computer Science, Vol.1666, Wiener, M. ed., Springer-Verlag 1999
    • (1999) Lecture Notes in Computer Science , vol.1666
    • Bellare, M.1    Miner, S.2
  • 34
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology, CRYPTO 89
    • Damgard,I.: A design principle for hash functions, in: Advances in Cryptology, CRYPTO 89, LNCS, Vol.435 (1989) 416-427
    • (1989) LNCS , vol.435 , pp. 416-427
    • Damgard, I.1
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest,R.L., Shamir,A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. Vol.21(2)(1978) 120-126
    • (1978) Communications of the ACMVol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 36
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmisson and memory
    • Eurocrypt 88, springer-verlag
    • Guillou,L., Quisquater,J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmisson and memory. Eurocrypt 88, LNCS, Vol. 330, springer-verlag, (1988) 123-128
    • (1988) LNCS , vol.330 , pp. 123-128
    • Guillou, L.1    Quisquater, J.2
  • 37
    • 4043135280 scopus 로고    scopus 로고
    • Comment on a remote user authentication scheme using smart cards with forward secrecy
    • Lee,S.W., Kim,H.S., Yoo,K.Y.: Comment on a remote user authentication scheme using smart cards with forward secrecy. IEEE Tran. on Consumer Electronics. Vol 50(2)(2004) 576-577
    • (2004) IEEE Tran. on Consumer Electronics , vol.50 , Issue.2 , pp. 576-577
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 38
    • 4043118421 scopus 로고    scopus 로고
    • Some remarks on a remote user authentication scheme using smart cards with forward secrecy
    • Kumar,M.: Some remarks on a remote user authentication scheme using smart cards with forward secrecy. IEEE Tran. on Consumer Electronics. Vol. 50(2)(2004) 615-618
    • (2004) IEEE Tran. on Consumer Electronics , vol.50 , Issue.2 , pp. 615-618
    • Kumar, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.