메뉴 건너뛰기




Volumn , Issue , 2008, Pages 132-134

Security analysis of a remote user authentication scheme using smart card

Author keywords

Authentication; Chaotic map; Cryptanalysis; Security

Indexed keywords

CHAOTIC SYSTEMS; CRYPTOGRAPHY; NEURAL NETWORKS; SIGNAL PROCESSING; SMART CARDS;

EID: 51849122424     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNNSP.2008.4590325     Document Type: Conference Paper
Times cited : (2)

References (9)
  • 1
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and Improvements of an Efficient Password Dased Remote User Authentication Scheme Using Smart Cards
    • February
    • Wei-chi Ku and Shui-min Chen. Weaknesses and Improvements of an Efficient Password Dased Remote User Authentication Scheme Using Smart Cards, IEEE Trans. on Consumer Electronics, Vol.50(1), February 2004, pp:204-206
    • (2004) IEEE Trans. on Consumer Electronics , vol.50 , Issue.1 , pp. 204-206
    • Ku, W.-C.1    Chen, S.-M.2
  • 2
    • 0036302680 scopus 로고    scopus 로고
    • An Efficient and Practical Solution to Remote Authentication: Smart Cards
    • PP
    • H.Y.Chien,J.KJan,and Y.M.Tsing, An Efficient and Practical Solution to Remote Authentication: Smart Cards, Computers and Security, Vol.21(4), 2002, PP.372-375
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    KJan, J.2    Tsing, Y.M.3
  • 3
    • 1542542682 scopus 로고    scopus 로고
    • Security of Two Remote User Authentication Schemes Using Smart Cards
    • November
    • Chien-Lung Hsu, Security of Two Remote User Authentication Schemes Using Smart Cards, IEEE Trans, on Consumer Electronics, Vol.49(4), November 2003, pp.1196-1198
    • (2003) IEEE Trans, on Consumer Electronics , vol.49 , Issue.4 , pp. 1196-1198
    • Hsu, C.-L.1
  • 5
    • 1542647564 scopus 로고    scopus 로고
    • Awasthi and Sunder lal, A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
    • November
    • Amit K.Awasthi and Sunder lal, A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy, IEEE Trans. on Consumer Electronics, Vol.49(4), November 2003, pp.1246-1248
    • (2003) IEEE Trans. on Consumer Electronics , vol.49 , Issue.4 , pp. 1246-1248
    • Amit, K.1
  • 6
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart Card Security under the Threat of Power Analysis Attacks
    • May
    • T.S.Messerges, E.A.Dabbish, and R.H.Sloan, Examining Smart Card Security under the Threat of Power Analysis Attacks, IEEE Trans.on Computers, Vol.51, May 2002, pp.541-552
    • (2002) IEEE Trans.on Computers , vol.51 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 7
    • 29144507139 scopus 로고    scopus 로고
    • Analyzing the Attacks Types on Cryptographic Protocol
    • PP
    • Li Li, Zhang Huang-guo. Analyzing the Attacks Types on Cryptographic Protocol. Computer Engineering and Application, Vol.171,2004, PP.16-19
    • (2004) Computer Engineering and Application , vol.171 , pp. 16-19
    • Li, L.1    Zhang, H.-G.2
  • 9
    • 25844491192 scopus 로고    scopus 로고
    • A System Inversion Approach to Chaos-Based Digital Secure Speech Communication
    • Aug
    • Zheng Yufan, Chen Guanrong, Zhu Canyan. A System Inversion Approach to Chaos-Based Digital Secure Speech Communication. International Journal of Bifurcation & Chaos, Vol.15, Aug. 2005, pp.2569-2582.
    • (2005) International Journal of Bifurcation & Chaos , vol.15 , pp. 2569-2582
    • Yufan, Z.1    Chen, G.2    Zhu, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.