메뉴 건너뛰기




Volumn , Issue , 2009, Pages 296-300

Security analysis of two password authentication schemes

Author keywords

Authentication; Impersonation attacks; Password; smart card; Replay

Indexed keywords

AUTHENTICATION SCHEME; IMPERSONATION ATTACK; IMPERSONATION ATTACKS; LEGITIMATE USERS; PASSWORD AUTHENTICATION; PASSWORD SMART CARD; REMOTE SERVERS; REMOTE USERS; REPLAY; REPLAY ATTACK; SECURITY ANALYSIS; STORAGE DEVICES; UNIVERSAL SERIAL BUS;

EID: 70449574216     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMB.2009.57     Document Type: Conference Paper
Times cited : (8)

References (15)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communication of ACM 24(1981). pp.28-30.
    • (1981) Communication of ACM , vol.24 , pp. 28-30
    • Lamport, L.1
  • 2
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • March
    • H. Guo, Z. Li, Y. Mu, X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers&Security, Vol.27, No.1-2, pp. 16-21, March 2008.
    • (2008) Computers&Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 3
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • doi:10.1016/j.csi.2008.09.006
    • J. Xu, W.-T. Zhu, D.-G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards&Interfaces doi:10.1016/j.csi.2008.09.006.
    • Computer Standards&Interfaces
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 4
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • August
    • T. Xiang, K. Wong, X. Liao, "Cryptanalysis of a password authentication scheme over insecure networks", Computer and System Sciences, Vol.74, No.5, pp. 657-661,August 2008.
    • (2008) Computer and System Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.2    Liao, X.3
  • 5
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • C.L. Hsu, Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards&Interfaces 26 (3) (2004) 167-169.
    • (2004) Computer Standards&Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 6
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • June
    • I. E. Liao, C. C. Lee, M. S. Hwang, "A password authentication scheme over insecure networks", Journal of Computer and System Sciences, Vol.72, No.4, pp. 727-740, June 2006.
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 7
    • 9544227377 scopus 로고    scopus 로고
    • Improvement of Chien et al.'s remote user authentication scheme using smart cards
    • S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards&Interfaces 27(2) (2005) 181-183.
    • (2005) Computer Standards&Interfaces , vol.27 , Issue.2 , pp. 181-183
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 8
    • 47249106837 scopus 로고    scopus 로고
    • Vulnerabilities in a remote agent authentication scheme using smart cards
    • April
    • Y. Lee, J. Nam, D. Won, "Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards", LNCS: AMSTA, Vol.4953, pp. 850-857, April 2008.
    • (2008) LNCS: AMSTA , vol.4953 , pp. 850-857
    • Lee, Y.1    Nam, J.2    Won, D.3
  • 9
    • 35448940560 scopus 로고    scopus 로고
    • Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
    • January
    • H. B. Chen, T. H. Chen, W. B. Lee, C. C. Chang, "Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks", Computer Standards&Interfaces, Vol.30, No. 1- 2, pp. 95-99, January 2008.
    • (2008) Computer Standards&Interfaces , vol.30 , Issue.1-2 , pp. 95-99
    • Chen, H.B.1    Chen, T.H.2    Lee, W.B.3    Chang, C.C.4
  • 10
    • 44549088413 scopus 로고    scopus 로고
    • Improvement of the peyravian-jeffries's user authentication protocol and password change protocol
    • June
    • M. Hölbl, T. Welzer, B. Brumen, "Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol", Computer Communications, Vol.31, No.10, pp. 1945-1951, June 2008.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 1945-1951
    • Hölbl, M.1    Welzer, T.2    Brumen, B.3
  • 11
    • 33144456748 scopus 로고    scopus 로고
    • Secure remote user access over insecure networks
    • March
    • M. Peyravian, C. Jeffries, "Secure remote user access over insecure networks",Computer Communications, Vol.29, No.5, pp. 660-667, March 2006.
    • (2006) Computer Communications , vol.29 , Issue.5 , pp. 660-667
    • Peyravian, M.1    Jeffries, C.2
  • 12
    • 0007029111 scopus 로고    scopus 로고
    • The effects of logistics capabilities and strategy on firm performance
    • Daniel F.Lynch, Scott B.Keller, John Ozment (2000). "The effects of logistics capabilities and strategy on firm performance". Journal of Business Logistics, Vol.21, No.2, pp.47-67.
    • (2000) Journal of Business Logistics , vol.21 , Issue.2 , pp. 47-67
    • Lynch, D.F.1    Keller, S.B.2    Ozment, J.3
  • 13
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C.I. Fan, Y.C. Chan, Z.K. Zhang, Robust remote authentication scheme with smart cards, Computers&Security 24 (8) (2005) 619-628.
    • (2005) Computers&Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 14
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
    • M.K. Khan, J. Zhang, Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards&Interfaces 29 (1) (2007),82-85. (Pubitemid 44773789)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.