메뉴 건너뛰기




Volumn 4, Issue 6 B, 2010, Pages 2431-2436

Security analysis and improvement of the remote user authentication scheme without using smart cards

Author keywords

Electronic commerce; Remote user authentication; Security and privacy protection; Smart card

Indexed keywords

IMPERSONATION ATTACK; INSIDER ATTACK; REMOTE USER AUTHENTICATION; REMOTE USER AUTHENTICATION SCHEMES; SECURITY ANALYSIS; SECURITY AND PRIVACY PROTECTION; STORAGE DEVICES;

EID: 78650282598     PISSN: 1881803X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (15)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, Password authentication with insecure communication, Communications of ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Communications of ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote user authentication scheme using smart cards
    • H. M. Sun, An efficient remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 4, pp. 958-961, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 3
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang and L. H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 4
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, and Y. M. Tseng, An efficient and practical solution to remote authentication: smart card, Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 6
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W. C. Ku and S. M. Chen, Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 7
    • 32444434862 scopus 로고    scopus 로고
    • Efficient remote mutual authentication and key agreement
    • W. G. Shieh and J. M. Wang, Efficient remote mutual authentication and key agreement, Computers & Security, vol. 25, no. 1, pp. 72-77, 2006.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 72-77
    • Shieh, W.G.1    Wang, J.M.2
  • 9
    • 77953894144 scopus 로고    scopus 로고
    • An improvement to Kim-Chung's authentication scheme
    • W. G. Shieh and M. T. Wang, An improvement to Kim-Chung's authentication scheme, ICIC Express Letters, vol. 3, no. 4, pp. 1215-1219, 2009.
    • (2009) ICIC Express Letters , vol.3 , Issue.4 , pp. 1215-1219
    • Shieh, W.G.1    Wang, M.T.2
  • 10
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of 'a flexible biometrics remote user authentication scheme'
    • DOI 10.1016/j.csi.2006.01.002, PII S0920548906000122
    • M. K. Khan and J. Zhang, Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards & Interfaces, vol. 29, no. 1, pp. 82-85, 2007. (Pubitemid 44773789)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 11
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. I. Fan, Y. C. Chan, and Z. K. Zhang, Robust remote authentication scheme with smart cards, Computers & Security, vol. 24, no. 8, pp. 619-628, 2005.
    • (2005) Computers & Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 12
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    • H. R. Chung, W. C. Ku, and M. J. Tsaur, Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments, Computer Standards & Interfaces, vol. 31, no. 4, pp. 863-868, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.R.1    Ku, W.C.2    Tsaur, M.J.3
  • 13
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • H. S. Rhee, J. O. Kwon, and D. H. Lee, A remote user authentication scheme without using smart cards, Computer Standards & Interfaces, vol. 31, no. 1, pp. 6-13, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 15
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • J. S. Coron, On the exact security of full domain hash, CRYPTO 2000 (LNCS 1880), pp. 229-235, 2000.
    • (2000) CRYPTO 2000 (LNCS 1880) , pp. 229-235
    • Coron, J.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.