메뉴 건너뛰기




Volumn 18, Issue 1, 2007, Pages 27-36

A secure YS-like user authentication scheme

Author keywords

Forgery attack; Message authentication; Mutual authentication; Password; Remote user authentication; Smart card

Indexed keywords


EID: 33947392992     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (9)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Bellare, M., R. Canetti and H. Krawczyk (1996). Keying hash functions for message authentication. In N. Koblitz (Ed.), Proceedings of Advances in Cryptology - Crypto 96, Lecture Notes in Computer Science, 1109, Springer-Verlag.
    • Bellare, M., R. Canetti and H. Krawczyk (1996). Keying hash functions for message authentication. In N. Koblitz (Ed.), Proceedings of Advances in Cryptology - Crypto 96, Lecture Notes in Computer Science, 1109, Springer-Verlag.
  • 2
    • 0036167785 scopus 로고    scopus 로고
    • Cryptanalysis of timestamp-based password authentication scheme
    • Chan, C.K., and L.M. Cheng (2001). Cryptanalysis of timestamp-based password authentication scheme. Computers & Security, 21(1), 74-76.
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 74-76
    • Chan, C.K.1    Cheng, L.M.2
  • 3
    • 0345764840 scopus 로고    scopus 로고
    • Attacks on the (enhanced) Yang-Shieh authentication
    • Chen, K.F., and S. Zhong (2003). Attacks on the (enhanced) Yang-Shieh authentication. Computer & Security, 22(8), 725-727.
    • (2003) Computer & Security , vol.22 , Issue.8 , pp. 725-727
    • Chen, K.F.1    Zhong, S.2
  • 4
    • 0036429021 scopus 로고    scopus 로고
    • An enhancement of timestamp-based password authentication scheme
    • Fan, L., J.H. Li and H.W. Zhu (2002). An enhancement of timestamp-based password authentication scheme. Computers & Security, 21(7), 665-667.
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 665-667
    • Fan, L.1    Li, J.H.2    Zhu, H.W.3
  • 5
    • 23344449693 scopus 로고    scopus 로고
    • ID-based password authentication scheme using smart cards and fingerprints
    • Kim, H.S., S.W. Lee and K.Y. Yoo (2003). ID-based password authentication scheme using smart cards and fingerprints. ACM Operating Systems Review, 37(4), 32-41.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 32-41
    • Kim, H.S.1    Lee, S.W.2    Yoo, K.Y.3
  • 6
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • Shen, J.J., C.W. Lin and M.S. Hwang (2003). Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security, 22(7), 591-595.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 7
    • 4043178772 scopus 로고    scopus 로고
    • Further cryptanalysis of a password authentication scheme with smart cards
    • Sun, H.M., and H.T. Yeh (2003). Further cryptanalysis of a password authentication scheme with smart cards. IEICE Transactions on Communications, E86-B(4), 1412-1415.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.4 , pp. 1412-1415
    • Sun, H.M.1    Yeh, H.T.2
  • 8
    • 12244291938 scopus 로고    scopus 로고
    • An improvement of the Yang-Shieh password authentication schemes
    • Yang, C.C., R.C. Wang and T.Y. Chang (2005). An improvement of the Yang-Shieh password authentication schemes. Applied Mathematics and Computation, 162(3), 1391-1396.
    • (2005) Applied Mathematics and Computation , vol.162 , Issue.3 , pp. 1391-1396
    • Yang, C.C.1    Wang, R.C.2    Chang, T.Y.3
  • 9
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • Yang, W.H., and S.P. Shieh (1999). Password authentication schemes with smart cards. Computers & Security, 18(8), 727-733.
    • (1999) Computers & Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.