메뉴 건너뛰기




Volumn 56, Issue 6, 2009, Pages 2284-2291

Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards

Author keywords

Authentication; Key agreement; Network security; Password; Smart card

Indexed keywords

COMPUTATION COSTS; IMPROVED SCHEME; KEY AGREEMENT; KEY PROBLEMS; PASSWORD; PASSWORD-AUTHENTICATED KEY AGREEMENT; REAL-LIFE APPLICATIONS; SECRET KEY;

EID: 67649386419     PISSN: 02780046     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIE.2009.2016508     Document Type: Article
Times cited : (94)

References (22)
  • 1
    • 33947421714 scopus 로고    scopus 로고
    • Network-based fuzzy decentralized sliding-mode control for car-like mobile robots
    • Feb
    • C. L. Hwang, L. J. Chang, and Y. S. Yu, "Network-based fuzzy decentralized sliding-mode control for car-like mobile robots," IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 574-585, Feb. 2007.
    • (2007) IEEE Trans. Ind. Electron , vol.54 , Issue.1 , pp. 574-585
    • Hwang, C.L.1    Chang, L.J.2    Yu, Y.S.3
  • 2
    • 37549072558 scopus 로고    scopus 로고
    • Networked predictive control of systems with random network delays in both forward and feedback channels
    • Jun
    • G. P. Liu, Y. Xia, J. Chen, D. Rees, and W. Hu, "Networked predictive control of systems with random network delays in both forward and feedback channels," IEEE Trans. Ind. Electron., vol. 54, no. 3, pp. 1282-1297, Jun. 2007.
    • (2007) IEEE Trans. Ind. Electron , vol.54 , Issue.3 , pp. 1282-1297
    • Liu, G.P.1    Xia, Y.2    Chen, J.3    Rees, D.4    Hu, W.5
  • 3
    • 65449167290 scopus 로고    scopus 로고
    • A remote-control engineering laboratory
    • Jun
    • C. Lazar and S. Carari, "A remote-control engineering laboratory," IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2368-2375, Jun. 2008.
    • (2008) IEEE Trans. Ind. Electron , vol.55 , Issue.6 , pp. 2368-2375
    • Lazar, C.1    Carari, S.2
  • 4
    • 47049131413 scopus 로고    scopus 로고
    • Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks
    • Jul
    • D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, "Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks," IEEE Trans. Ind. Electron. vol. 55, no. 7, pp. 2759-2766, Jul. 2008.
    • (2008) IEEE Trans. Ind. Electron , vol.55 , Issue.7 , pp. 2759-2766
    • Dondi, D.1    Bertacchini, A.2    Brunelli, D.3    Larcher, L.4    Benini, L.5
  • 5
    • 51449105416 scopus 로고    scopus 로고
    • Extending vehicular CAN fieldbuses with delay-tolerant networks
    • Sep
    • F. Gil-Castiñeira, F. J. González-Castaño, and L. Franck, "Extending vehicular CAN fieldbuses with delay-tolerant networks," IEEE Trans. Ind. Electron., vol. 55, no. 9, pp. 3307-3314, Sep. 2008.
    • (2008) IEEE Trans. Ind. Electron , vol.55 , Issue.9 , pp. 3307-3314
    • Gil-Castiñeira, F.1    González-Castaño, F.J.2    Franck, L.3
  • 6
    • 60449087942 scopus 로고    scopus 로고
    • Electronics in automotive engineering: A top-down approach for implementing industrial fieldbus technologies in city buses and coaches
    • Feb
    • P. Mariño, F. Poza, M. A. Domínguez, and S. Otero, "Electronics in automotive engineering: A top-down approach for implementing industrial fieldbus technologies in city buses and coaches," IEEE Trans. Ind. Electron., vol. 56, no. 2, pp. 589-600, Feb. 2009.
    • (2009) IEEE Trans. Ind. Electron , vol.56 , Issue.2 , pp. 589-600
    • Mariño, P.1    Poza, F.2    Domínguez, M.A.3    Otero, S.4
  • 8
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proc. 13th Advances Cryptology-CRYPTO, D. R. Stinson, Ed
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Proc. 13th Advances Cryptology-CRYPTO, D. R. Stinson, Ed, 1994, LNCS, vol. 773, pp. 232-249.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 9
  • 10
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Feb
    • W. C. Ku and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 204-207, Feb. 2004.
    • (2004) IEEE Trans. Consum. Electron , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 11
    • 26944497206 scopus 로고    scopus 로고
    • Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards
    • Proc. 2nd Int. Conf. FSKD, L. Wang and Y. Jin, Eds
    • D. Z. Sun and Z. F. Cao, "Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards," in Proc. 2nd Int. Conf. FSKD, L. Wang and Y. Jin, Eds, 2005, LNAI, vol. 3614, pp. 596-599.
    • (2005) LNAI , vol.3614 , pp. 596-599
    • Sun, D.Z.1    Cao, Z.F.2
  • 12
    • 27144545000 scopus 로고    scopus 로고
    • Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme
    • Nov
    • D. Z. Sun, J. D. Zhong, and Y. Sun, "Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme," Appl. Math. Comput., vol. 170, no. 2, pp. 1185-1193, Nov. 2005.
    • (2005) Appl. Math. Comput , vol.170 , Issue.2 , pp. 1185-1193
    • Sun, D.Z.1    Zhong, J.D.2    Sun, Y.3
  • 13
    • 34247505487 scopus 로고    scopus 로고
    • Security enhancement of an IC-card-based remote login mechanism
    • Jun
    • T. F. Cheng, J. S. Lee, and C. C. Chang, "Security enhancement of an IC-card-based remote login mechanism," Comput. Netw., vol. 51, no. 9, pp. 2280-2287, Jun. 2007.
    • (2007) Comput. Netw , vol.51 , Issue.9 , pp. 2280-2287
    • Cheng, T.F.1    Lee, J.S.2    Chang, C.C.3
  • 14
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • Jun
    • J. Y. Liu, A. M. Zhou, and M. X. Gao, "A new mutual authentication scheme based on nonce and smart cards," Comput. Commun., vol. 31, no. 10, pp. 2205-2209, Jun. 2008.
    • (2008) Comput. Commun , vol.31 , Issue.10 , pp. 2205-2209
    • Liu, J.Y.1    Zhou, A.M.2    Gao, M.X.3
  • 15
    • 58149395609 scopus 로고    scopus 로고
    • A new design of wearable token system for mobile device security
    • Nov
    • D. Z. Sun, J. P. Huai, J. Z. Sun, J. W. Zhang, and Z. Y. Feng, "A new design of wearable token system for mobile device security," IEEE Trans. Consum. Electron., vol. 54, no. 4, pp. 1784-1789, Nov. 2008.
    • (2008) IEEE Trans. Consum. Electron , vol.54 , Issue.4 , pp. 1784-1789
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Zhang, J.W.4    Feng, Z.Y.5
  • 16
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password-authenticated key agreement using smart cards
    • Jun
    • W. S. Juang, S. T. Chen, and H. T. Liaw, "Robust and efficient password-authenticated key agreement using smart cards," IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, Jun. 2008.
    • (2008) IEEE Trans. Ind. Electron , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 17
    • 84958769993 scopus 로고    scopus 로고
    • Side channel crypt-analysis of product ciphers
    • Proc. 5th ESORICS, J. J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds
    • J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side channel crypt-analysis of product ciphers," in Proc. 5th ESORICS, J. J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds, 1998, LNCS, vol. 1485, pp. 97-110.
    • (1998) LNCS , vol.1485 , pp. 97-110
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3    Hall, C.4
  • 18
    • 39549112119 scopus 로고    scopus 로고
    • An efficient modular exponentiation algorithm against simple power analysis attacks
    • Nov
    • D. Z. Sun, J. P. Huai, J. Z. Sun, and Z. F. Cao, "An efficient modular exponentiation algorithm against simple power analysis attacks," IEEE Trans. Consum. Electron., vol. 53, no. 4, pp. 1718-1723, Nov. 2007.
    • (2007) IEEE Trans. Consum. Electron , vol.53 , Issue.4 , pp. 1718-1723
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Cao, Z.F.4
  • 19
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • Proc. 5th Annu. Int. Workshop SAC, S. Tavares and H. Meijer, Eds
    • S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols," in Proc. 5th Annu. Int. Workshop SAC, S. Tavares and H. Meijer, Eds, 1999, LNCS, vol. 1556, pp. 339-361.
    • (1999) LNCS , vol.1556 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 20
    • 67649341303 scopus 로고    scopus 로고
    • ITU-T, Recommendation X.509-the Directory: Public-Key and Attribute Certificate Frameworks, ITU-T Study Group 17, Aug. 2005. (equivalent to ISO/IEC 9594-8).
    • ITU-T, Recommendation X.509-the Directory: Public-Key and Attribute Certificate Frameworks, ITU-T Study Group 17, Aug. 2005. (equivalent to ISO/IEC 9594-8).
  • 22
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • Aug
    • S. Halevi and H. Krawczyk, "Public-key cryptography and password protocols," ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, pp. 230-268, Aug. 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.