메뉴 건너뛰기




Volumn 50, Issue 2, 2004, Pages 565-567

Improved efficient remote user authentication scheme using smart cards

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA; SMART CARDS;

EID: 4043087111     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2004.1309424     Document Type: Article
Times cited : (46)

References (10)
  • 1
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS 196
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Proceedings CRYPTO'84, LNCS 196, pp. 47-53, 1984.
    • (1984) Proceedings CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 2
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 3
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • C. K. Chan and L. M. Cheng. "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 992-993, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 992-993
    • Chan, C.K.1    Cheng, L.M.2
  • 4
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remoter user authentication scheme using smart cards
    • J. K. Lee, S. R. Ryu, and K. Y. Yoo, "Fingerprint-based remoter user authentication scheme using smart cards," IEE Electronics Letters, vol. 38, no. 12, 2002.
    • (2002) IEE Electronics Letters , vol.38 , Issue.12
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 5
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • J. J. Shen, C. W. Lin, and M. S Hwang, "A Modified Remote User Authentication Scheme Using Smart Cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, 2003.
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang M.S3
  • 6
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • H. M. Sun, "An efficient remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 7
    • 0041698518 scopus 로고    scopus 로고
    • A flexible remote user authentication scheme using smart cards
    • C. C. Lee, M. S. Hwang, and W. P. Yang, "A flexible remote user authentication scheme using smart cards," ACM Operating Systems Review, vol. 36, no. 3, pp. 46-52, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.3 , pp. 46-52
    • Lee, C.C.1    Hwang, M.S.2    Yang, W.P.3
  • 8
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 9
    • 0742268499 scopus 로고    scopus 로고
    • Security of chien et al.'s remote user authentication scheme using smart cards
    • Article in press
    • C. L. Hsu, "Security of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards & Interfaces, 2003, Article in press.
    • (2003) Computer Standards and Interfaces
    • Hsu, C.L.1
  • 10
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • L. Gong, "A security risk of depending on synchronized clocks," Operating Systems Review, vol. 26, no. 1, pp. 49-53, 1992.
    • (1992) Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.