메뉴 건너뛰기




Volumn 4953 LNAI, Issue , 2008, Pages 850-857

Vulnerabilities in a remote agent authentication scheme using smart cards

Author keywords

Authentication scheme; Distributed system; Impersonation attack; Smart card

Indexed keywords

ACCESS CONTROL; AGENTS; AUTHENTICATION; FINANCIAL DATA PROCESSING; SMART CARDS; SOFTWARE AGENTS; TECHNOLOGY;

EID: 47249106837     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78582-8_86     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 47249160851 scopus 로고    scopus 로고
    • Anti-Phishing Working Group, http://www.antiphishing.org
    • Group
  • 5
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An efficient and practical solution to remote authentication: smart card. Computers & Security 21(4), 372-375 (2002)
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 7
    • 0742268499 scopus 로고    scopus 로고
    • Hsu, C.-L.: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26(3), 167-169 (2004)
    • Hsu, C.-L.: Security of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26(3), 167-169 (2004)
  • 8
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 46(1), 28-30 (2000)
    • (2000) IEEE Trans. on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.-S.1    Li, L.-H.2
  • 10
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 11
    • 26044463804 scopus 로고    scopus 로고
    • Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture
    • Ku, W.-C., Chang, S.-T., Chiang, M.-H.: Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. on Commmunications E88-B(8), 3451-3454 (2005)
    • (2005) IEICE Trans. on Commmunications , vol.E88-B , Issue.8 , pp. 3451-3454
    • Ku, W.-C.1    Chang, S.-T.2    Chiang, M.-H.3
  • 12
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 13
    • 33845410115 scopus 로고    scopus 로고
    • Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 508-516. Springer, Heidelberg (2006)
    • Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 508-516. Springer, Heidelberg (2006)
  • 14
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56(3), 131-133 (1995)
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • Messerges, T.-S., Dabbish, E.-A., Sloan, R.-H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers 51(5), 541-552 (2002)
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.-S.1    Dabbish, E.-A.2    Sloan, R.-H.3
  • 16
    • 33846446132 scopus 로고    scopus 로고
    • Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E90-A(1), 299-302 (2007)
    • Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E90-A(1), 299-302 (2007)
  • 17
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • Sun, H.-M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 46(4), 958-961 (2000)
    • (2000) IEEE Trans. on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.-M.1
  • 18
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart card
    • Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart card. Computers & Security 18(8), 727-733 (1999)
    • (1999) Computers & Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.-H.1    Shieh, S.-P.2
  • 19
    • 26844467695 scopus 로고    scopus 로고
    • Security enhancement for password authentication schemes with smart cards
    • Katsikas, S.K, López, J, Pernul, G, eds, TrustBus 2005, Springer, Heidelberg
    • Yoon, E.-J., Kim, W.-H., Yoo, K.-Y.: Security enhancement for password authentication schemes with smart cards. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 90-99. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3592 , pp. 90-99
    • Yoon, E.-J.1    Kim, W.-H.2    Yoo, K.-Y.3
  • 20
    • 15744404005 scopus 로고    scopus 로고
    • An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
    • Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Computers & Security 24(1), 50-56 (2005)
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 50-56
    • Yoon, E.-J.1    Ryu, E.-K.2    Yoo, K.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.