메뉴 건너뛰기




Volumn , Issue , 2008, Pages 308-314

Security weaknesses in Chang and Wu's key agreement protocol for a multi-server environment

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 58149093185     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEBE.2008.56     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 1
    • 58149094171 scopus 로고    scopus 로고
    • Anti-Phishing Working Group (http://www.antiphishing.org).
    • Group
  • 4
    • 38049131767 scopus 로고    scopus 로고
    • A novel key agreement scheme in a multiple server environment
    • 7th International Workshop, Workshop on Information Security Applications WISA 2006
    • C.-C. Chang and C.-C. Wu. A novel key agreement scheme in a multiple server environment. 7th International Workshop, Workshop on Information Security Applications (WISA 2006), LNCS, 4298:187-197, 2007.
    • (2007) LNCS , vol.4298 , pp. 187-197
    • Chang, C.-C.1    Wu, C.-C.2
  • 6
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers & Security, 21(4):372-375, 2002.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 9
    • 0742268499 scopus 로고    scopus 로고
    • C.-L. Hsu. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
    • C.-L. Hsu. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
  • 10
    • 0742268499 scopus 로고    scopus 로고
    • M.-S. Hwang and L.-H. Li. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
    • M.-S. Hwang and L.-H. Li. Security of chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces, 26(3):167-169, 2004.
  • 11
    • 58149084708 scopus 로고    scopus 로고
    • M.-S. Hwang, L.-H. Li, and Y.-L. Tang. A simple remote user authentication
    • M.-S. Hwang, L.-H. Li, and Y.-L. Tang. A simple remote user authentication.
  • 12
    • 33746019294 scopus 로고    scopus 로고
    • An extension of secure group communication using key graph
    • Z. Jun, Z. Yu, M. Fanyuan, G. Dawu, and B. Yingcai. An extension of secure group communication using key graph. Information Sciences, 176(20):3060-3078, 2006.
    • (2006) Information Sciences , vol.176 , Issue.20 , pp. 3060-3078
    • Jun, Z.1    Yu, Z.2    Fanyuan, M.3    Dawu, G.4    Yingcai, B.5
  • 13
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Proceedings of Advances in Cryptology CRYPTO 2003
    • J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. Proceedings of Advances in Cryptology (CRYPTO 2003), LNCS, 2729(20):110-125, 2003.
    • (2003) LNCS , vol.2729 , Issue.20 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 15
    • 26044463804 scopus 로고    scopus 로고
    • Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture
    • E88-B(8):3451-3454
    • W.-C. Ku, S.-T. Chang, and M.-H. Chiang. Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. on Commmunications, E88-B(8):3451-3454, 2005.
    • (2005) IEICE Trans. on Commmunications
    • Ku, W.-C.1    Chang, S.-T.2    Chiang, M.-H.3
  • 16
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 17
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • L.-H. Li, I.-C. Lin, and M.-S. Hwang. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. on Neural Networks, 12(6), 2001.
    • (2001) IEEE Trans. on Neural Networks , vol.12 , Issue.6
    • Li, L.-H.1    Lin, I.-C.2    Hwang, M.-S.3
  • 18
    • 0037211327 scopus 로고    scopus 로고
    • A new remote user authentication scheme for multi-server internet environments
    • I.-C. Lin, M.-S. Hwang, and L.-H. Li. A new remote user authentication scheme for multi-server internet environments. Future Generation Computer System, 19:13-22, 2003.
    • (2003) Future Generation Computer System , vol.19 , pp. 13-22
    • Lin, I.-C.1    Hwang, M.-S.2    Li, L.-H.3
  • 20
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 21
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • T.-S. Messerges, E.-A. Dabbish, and R.-H. Sloan. Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers, 51(5):541-552, 2002.
    • (2002) IEEE Trans. on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.-S.1    Dabbish, E.-A.2    Sloan, R.-H.3
  • 22
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim, and D. Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences, 177(6): 1364-1375, 2007.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 23
    • 33751229614 scopus 로고    scopus 로고
    • Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    • K.-A. Shim and S. Woo. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences, 177(4): 1143-1151, 2007.
    • (2007) Information Sciences , vol.177 , Issue.4 , pp. 1143-1151
    • Shim, K.-A.1    Woo, S.2
  • 24
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • H.-M. Sun. An efficient remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics, 46(4):958-961, 2000.
    • (2000) IEEE Trans. on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.-M.1
  • 26
    • 4043171870 scopus 로고    scopus 로고
    • A smart card-based remote scheme for password authentication in multi-server internet services
    • W.-J. Tsaur, C.-C. Wu, and W.-B. Lee. A smart card-based remote scheme for password authentication in multi-server internet services. Computer Standards & Interfaces, 27:39-51, 2004.
    • (2004) Computer Standards & Interfaces , vol.27 , pp. 39-51
    • Tsaur, W.-J.1    Wu, C.-C.2    Lee, W.-B.3
  • 27
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart card
    • W.-H. Yang and S.-R Shieh. Password authentication schemes with smart card. Computers & Security, 18(8):727-733, 1999.
    • (1999) Computers & Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.-H.1    Shieh, S.-R.2
  • 28
    • 26844467695 scopus 로고    scopus 로고
    • Security enhancement for password authentication schemes with smart cards
    • Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business TrustBus 2005
    • E.-J. Yoon, W.-H. Kim, and K.-Y. Yoo. Security enhancement for password authentication schemes with smart cards. Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2005), LNCS, 3592:90-99, 2005.
    • (2005) LNCS , vol.3592 , pp. 90-99
    • Yoon, E.-J.1    Kim, W.-H.2    Yoo, K.-Y.3
  • 29
    • 15744404005 scopus 로고    scopus 로고
    • An improvement of hwang-lee-tang's simple remote user authentication scheme
    • E.-J. Yoon, E.-K. Ryu, and K.-Y. Yoo. An improvement of hwang-lee-tang's simple remote user authentication scheme. Computers & Security, 24(l):50-56, 2005.
    • (2005) Computers & Security , vol.24 , Issue.L , pp. 50-56
    • Yoon, E.-J.1    Ryu, E.-K.2    Yoo, K.-Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.