메뉴 건너뛰기




Volumn 179, Issue 9, 2009, Pages 1269-1277

A countable and time-bound password-based user authentication scheme for the applications of electronic commerce

Author keywords

Electronic commerce; Password based user authentication; Quadratic residue

Indexed keywords

ACCESS CONTROL; COMMERCE; ELECTRONIC COMMERCE; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 60349091619     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2008.12.026     Document Type: Article
Times cited : (16)

References (37)
  • 1
    • 60349111972 scopus 로고    scopus 로고
    • N.F.P. 46-1, Data encryption standard, National Burean of Standards, U.S. Department of Commerce, 1988.
    • N.F.P. 46-1, Data encryption standard, National Burean of Standards, U.S. Department of Commerce, 1988.
  • 2
    • 60349095676 scopus 로고    scopus 로고
    • I. 9797, Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm, Internal Organization for Standardization.
    • I. 9797, Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm, Internal Organization for Standardization.
  • 3
    • 2142759434 scopus 로고    scopus 로고
    • End-to-end security protocol for mobile communications with end-user identification/authentication
    • Chang C.C., Chen K.L., and Hwang M.S. End-to-end security protocol for mobile communications with end-user identification/authentication. Wireless Personal Communications 28 2 (2004) 95-106
    • (2004) Wireless Personal Communications , vol.28 , Issue.2 , pp. 95-106
    • Chang, C.C.1    Chen, K.L.2    Hwang, M.S.3
  • 6
    • 0029514088 scopus 로고
    • Remote scheme for password authentication based on theory of quadratic residues
    • Chang C.C., Tsu S.M., and Chen C.Y. Remote scheme for password authentication based on theory of quadratic residues. Computer Communications 18 12 (1995) 936-942
    • (1995) Computer Communications , vol.18 , Issue.12 , pp. 936-942
    • Chang, C.C.1    Tsu, S.M.2    Chen, C.Y.3
  • 9
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Evans A.J., Kantrowitz W., and Weiss E. A user authentication scheme not requiring secrecy in the computer. Communications of the ACM 17 8 (1974) 437-442
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.J.1    Kantrowitz, W.2    Weiss, E.3
  • 10
    • 0005010894 scopus 로고
    • FIPS, Proposed federal information processing standard for secure hash standard
    • FIPS, Proposed federal information processing standard for secure hash standard, Federal Register 57(21) (1992) 3747-3749.
    • (1992) Federal Register , vol.57 , Issue.21 , pp. 3747-3749
  • 11
    • 0000270009 scopus 로고
    • Password authentication without using password table
    • Horng G. Password authentication without using password table. Information Processing Letters 55 5 (1995) 247-250
    • (1995) Information Processing Letters , vol.55 , Issue.5 , pp. 247-250
    • Horng, G.1
  • 12
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • Hwang M.S. A remote password authentication scheme based on the digital signature method. International Journal of Computer Mathematics 70 4 (1999) 657-666
    • (1999) International Journal of Computer Mathematics , vol.70 , Issue.4 , pp. 657-666
    • Hwang, M.S.1
  • 13
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang M.S., and Li L.H. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46 1 (2000) 28-30
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 15
    • 33845950814 scopus 로고    scopus 로고
    • A novel deniable authentication protocol using generalized Elgamal signature scheme
    • Lee W.B., Wu C.C., and Tsaur W.J. A novel deniable authentication protocol using generalized Elgamal signature scheme. Information Sciences 177 6 (2007) 1376-1381
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1376-1381
    • Lee, W.B.1    Wu, C.C.2    Tsaur, W.J.3
  • 17
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • Li L.H., Lin I.C., and Hwang M.S. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks 12 6 (2001) 1498-1504
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 18
    • 38149111391 scopus 로고    scopus 로고
    • A time-stamping proxy signature scheme using time-stamping service
    • Lu E.J.L., and Huang C.J. A time-stamping proxy signature scheme using time-stamping service. International Journal of Network Security 2 1 (2006) 43-51
    • (2006) International Journal of Network Security , vol.2 , Issue.1 , pp. 43-51
    • Lu, E.J.L.1    Huang, C.J.2
  • 19
    • 33846342359 scopus 로고    scopus 로고
    • A hash-based strong password authentication protocol with user anonymity
    • Mangipudi K., and Katti R. A hash-based strong password authentication protocol with user anonymity. International Journal of Network Security 2 3 (2006) 205-209
    • (2006) International Journal of Network Security , vol.2 , Issue.3 , pp. 205-209
    • Mangipudi, K.1    Katti, R.2
  • 21
    • 0025545583 scopus 로고
    • A fast software one-way hash function
    • Merkle R.C. A fast software one-way hash function. Journal of Cryptology 3 1 (1990) 43-58
    • (1990) Journal of Cryptology , vol.3 , Issue.1 , pp. 43-58
    • Merkle, R.C.1
  • 23
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 24
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • Nam J., Lee Y., Kim S., and Merkle D.W.C. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Merkle, D.W.C.4
  • 25
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Needham R.M., and Schroeder M.D. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978) 993-999
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 27
    • 60349084068 scopus 로고    scopus 로고
    • N.I. of Standards, N. Technology, Digital Signature Standard, Technical Report NIST FIPS PUB 186, U.S. Department of Commerce, May 1994.
    • N.I. of Standards, N. Technology, Digital Signature Standard, Technical Report NIST FIPS PUB 186, U.S. Department of Commerce, May 1994.
  • 28
    • 33645890580 scopus 로고    scopus 로고
    • Enforcing the security of a time-bound hierarchical key assignment scheme
    • Santis A.D., Ferrara A.L., and Masucci B. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences 176 12 (2006) 1684-1694
    • (2006) Information Sciences , vol.176 , Issue.12 , pp. 1684-1694
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 32
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way function much harder to crack
    • Udi M. A simple scheme to make passwords based on one-way function much harder to crack. Computers & Security 15 2 (1996) 171-176
    • (1996) Computers & Security , vol.15 , Issue.2 , pp. 171-176
    • Udi, M.1
  • 33
    • 0029710130 scopus 로고    scopus 로고
    • Smart card based secure password authentication scheme
    • Wang S.J., and Chang J.F. Smart card based secure password authentication scheme. Computers & Security 15 3 (1996) 231-237
    • (1996) Computers & Security , vol.15 , Issue.3 , pp. 231-237
    • Wang, S.J.1    Chang, J.F.2
  • 34
    • 0029535942 scopus 로고
    • Remote login authentication scheme based on a geometric approach
    • Wu T.C. Remote login authentication scheme based on a geometric approach. Computer Communications 18 12 (1995) 959-963
    • (1995) Computer Communications , vol.18 , Issue.12 , pp. 959-963
    • Wu, T.C.1
  • 35
    • 0000612396 scopus 로고    scopus 로고
    • Authentication passwords over an insecure channel
    • Wu T.C., and Sung H.S. Authentication passwords over an insecure channel. Computers & Security 15 5 (1996) 431-439
    • (1996) Computers & Security , vol.15 , Issue.5 , pp. 431-439
    • Wu, T.C.1    Sung, H.S.2
  • 37
    • 13544276811 scopus 로고    scopus 로고
    • Formal analysis of modern security protocols
    • Yasinsac A., and Childs J. Formal analysis of modern security protocols. Information Sciences 171 1-3 (2005) 189-211
    • (2005) Information Sciences , vol.171 , Issue.1-3 , pp. 189-211
    • Yasinsac, A.1    Childs, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.