메뉴 건너뛰기




Volumn 76 CCIS, Issue , 2010, Pages 9-16

Security improvement on a remote user authentication scheme using smart cards

Author keywords

Authentication; Cryptography; Password; Security; Smart card

Indexed keywords

IMPROVED SCHEME; MASQUERADE ATTACKS; NETWORK SYSTEMS; PARALLEL SESSION ATTACK; PASSWORD; REMOTE USER AUTHENTICATION SCHEMES; REMOTE USERS; SECURITY; SECURITY IMPROVEMENT;

EID: 77957937072     PISSN: 18650929     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-13365-7_2     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication smart card
    • Chien, H., Jan, J., Tseng, Y.: An efficient and practical solution to remote authentication smart card. Computers & Security 21(4), 372-375 (2002)
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.1    Jan, J.2    Tseng, Y.3
  • 4
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. 2(3), 230-268 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 5
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the YoonRyuYoo remote user authentication scheme using smart cards
    • Hsiang, H., Shih, W.: Weaknesses and improvements of the YoonRyuYoo remote user authentication scheme using smart cards. Computer Communications 32(4), 649-652
    • Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.1    Shih, W.2
  • 6
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart card
    • Hwang, M., Li, L.: A new remote user authentication scheme using smart card. IEEE Transactions on Consumer Electronics 46(1), 28-30 (2000)
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.1    Li, L.2
  • 8
    • 0000873739 scopus 로고
    • Reparable key distribution protocols for Internet environments
    • Hwang, T., Ku, W.: Reparable key distribution protocols for Internet environments. IEEE Trans. Consum. Electron. 43(5), 1947-1949 (1995)
    • (1995) IEEE Trans. Consum. Electron. , vol.43 , Issue.5 , pp. 1947-1949
    • Hwang, T.1    Ku, W.2
  • 9
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • DOI 10.1007/s00145-004-0312-y
    • Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. J. Cryptology 17, 263-276 (2004), doi:10.1007/s00145-004-0312-y (Pubitemid 41201459)
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 10
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(1), 204-207 (2004)
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.1    Chen, S.2
  • 11
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • Ku, W., Chen, C., Lee, H.: Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Transactions on Communication E86-B(5), 1682-1684 (2003)
    • (2003) IEICE Transactions on Communication E86-B , vol.5 , pp. 1682-1684
    • Ku, W.1    Chen, C.2    Lee, H.3
  • 12
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 13
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer network
    • Lee, W., Chang, C.: User identification and key distribution maintaining anonymity for distributed computer network. Comput. Syst. Sci. 15(4), 211-214 (2000)
    • (2000) Comput. Syst. Sci. , vol.15 , Issue.4 , pp. 211-214
    • Lee, W.1    Chang, C.2
  • 14
    • 0019579253 scopus 로고
    • Cryptographic authentication of time invariant quantities
    • Lennon, R., Matyas, S., Mayer, C.: Cryptographic authentication of time invariant quantities. IEEE Transactions on Communications 29(6), 773-777 (1981)
    • (1981) IEEE Transactions on Communications , vol.29 , Issue.6 , pp. 773-777
    • Lennon, R.1    Matyas, S.2    Mayer, C.3
  • 15
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • Liao, I., Lee, C., Hwang, M.: A password authentication scheme over insecure networks. J. Comput. System Sci. 72(4), 727-740 (2006)
    • (2006) J. Comput. System Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.1    Lee, C.2    Hwang, M.3
  • 16
    • 0024715186 scopus 로고
    • Limitations of challenge-response entity authentication
    • Mitchell, C.: Limitations of challenge-response entity authentication. Electronic Letters 25(17), 1195-1196 (1989)
    • (1989) Electronic Letters , vol.25 , Issue.17 , pp. 1195-1196
    • Mitchell, C.1
  • 17
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote use authentication scheme using smart cards
    • Sun, H.: An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(4), 958-961 (2000)
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.1
  • 18
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • May 15 (in press) (corrected Proof
    • Yang, G., Wong, D., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences (May 15, 2008) (in press) (corrected Proof)
    • (2008) Journal of Computer and System Sciences
    • Yang, G.1    Wong, D.2    Wang, H.3    Deng, X.4
  • 19
    • 0003256983 scopus 로고    scopus 로고
    • Shared authentication token secure against replay and weak key attack
    • Yen, S., Liao, K.: Shared authentication token secure against replay and weak key attack. Information Processing Letters, 78-80 (1997)
    • (1997) Information Processing Letters , pp. 78-80
    • Yen, S.1    Liao, K.2
  • 20
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • Yoon, E., Ryu, E., Yoo, K.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 612-614 (2004)
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.1    Ryu, E.2    Yoo, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.