메뉴 건너뛰기




Volumn 3, Issue 4, 2010, Pages 355-362

Weaknesses of a dynamic ID-based remote user authentication scheme

Author keywords

Attacks; Authentication; Cryptanalysis; Security; Smart card

Indexed keywords

SMART CARDS;

EID: 79951667906     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2010.038613     Document Type: Article
Times cited : (12)

References (13)
  • 1
    • 33751197641 scopus 로고    scopus 로고
    • Comment on a dynamic ID-based remote user authentication scheme
    • Awashti, A.K. (2004) 'Comment on a dynamic ID-based remote user authentication scheme', Transactions on Cryptology, Vol. 1, No. 2, pp.15-16.
    • (2004) Transactions on Cryptology , vol.1 , Issue.2 , pp. 15-16
    • Awashti, A.K.1
  • 2
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Cryptography and Coding
    • Blake-Wilson, S., Johnson, D. and Menezes, A. (1997) 'Key agreement protocols and their security analysis', The Sixth International Conference on Cryptography and Coding, pp.30-45. (Pubitemid 128005797)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 5
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.S. and Li, L.H. (2000) 'A new remote user authentication scheme using smart cards', IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp.28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 6
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme
    • doi:10.1016/j.comcom.2010.02.011
    • Khan, M.K., Kim, S.K. and Alghathbar, K. (2010) 'Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme', Computers and Communications, doi:10.1016/j.comcom. 2010.02.011.
    • (2010) Computers and Communications
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 8
    • 24144494609 scopus 로고    scopus 로고
    • Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    • Ku, W.C. and Chang, S.T. (2005) 'Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards', IEICE Transactions on Communication, Vol. E88-B, No. 5, pp.2165-2167.
    • (2005) IEICE Transactions on Communication , vol.E88-B , Issue.5 , pp. 2165-2167
    • Ku, W.C.1    Chang, S.T.2
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L. (1981) 'Password authentication with insecure communication', Communications of the ACM, Vol. 24, No. 11, pp.770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 11
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T.S., Dabbish, E.A. and Sloan, R.H. (2002) 'Examining smart-card security under the threat of power analysis attacks', IEEE Transactions on Computers, Vol. 51, No. 5, pp.541-552. (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 12
    • 70350724053 scopus 로고    scopus 로고
    • Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme
    • Misbahuddin, M. and Bindu, C.S. (2008) 'Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme', Int. J. Network Security, Vol. 6, No. 6, pp.211-213.
    • (2008) Int. J. Network Security , vol.6 , Issue.6 , pp. 211-213
    • Misbahuddin, M.1    Bindu, C.S.2
  • 13
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID based remote user authentication scheme
    • Wang, Y.Y., Kiu, J.Y., Xiao, F.X. and Dan, J. (2009) 'A more efficient and secure dynamic ID based remote user authentication scheme', Computer Communications, No. 32, pp.583-585.
    • (2009) Computer Communications , Issue.32 , pp. 583-585
    • Wang, Y.Y.1    Kiu, J.Y.2    Xiao, F.X.3    Dan, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.