메뉴 건너뛰기




Volumn E94-A, Issue 6, 2011, Pages 1426-1433

Further improved remote user authentication scheme

Author keywords

Authentication; Network level security and protection; Password; Security

Indexed keywords

COMPUTER SCIENCE; ELECTRICAL ENGINEERING;

EID: 79957996699     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1587/transfun.E94.A.1426     Document Type: Article
Times cited : (10)

References (26)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol.24, no.11, pp.770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M.S. Hwang and L.H. Li, "A new remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.46, no.1, pp.28-30, 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 3
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication smart card
    • H.Y. Chien, J.K. Jan, and Y.M. Tseng, "An efficient and practical solution to remote authentication smart card," Comput. Secur., vol.21, no.4, pp.372-375, 2000.
    • (2000) Comput. Secur. , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 4
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • C.L. Hsu, "Security of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards & Interfaces, vol.26, no.3, pp.167-169, 2004.
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 5
    • 4043087111 scopus 로고    scopus 로고
    • Improved efficient remote user authentication scheme using smart cards
    • S.W. Lee, H.S. Kim, and K.Y. Yoo, "Improved efficient remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol.50, no.2, pp.565-567, 2004.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 565-567
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 6
    • 9544227377 scopus 로고    scopus 로고
    • Improvement of Chien et al.'s remote user authentication scheme using smart cards
    • S.W. Lee, H.S. Kim, and K.Y. Yoo, "Improvement of Chien et al.'s remote user authentication scheme using smart cards," Computer Standards & Interfaces, vol.27, no.2, pp.181-183, 2005.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.2 , pp. 181-183
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 7
  • 8
    • 61849096169 scopus 로고    scopus 로고
    • More secure remote user authentication scheme
    • S.K. Kim andM.G. Chung, "More secure remote user authentication scheme," Comput. Commun., vol.32, no.6, pp.1018-1021, 2009.
    • (2009) Comput. Commun. , vol.32 , Issue.6 , pp. 1018-1021
    • Kim, S.K.1    Chung, M.G.2
  • 9
    • 23044436725 scopus 로고    scopus 로고
    • Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture
    • W.C. Ku, "Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture," IEEE Trans. Neural Netw., vol.16, no.4, pp.1002-1005, 2005.
    • (2005) IEEE Trans. Neural Netw. , vol.16 , Issue.4 , pp. 1002-1005
    • Ku, W.C.1
  • 10
    • 29144514489 scopus 로고    scopus 로고
    • Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks
    • Nov.
    • C.C. Yang and R.C. Wang, "Cryptanalysis of improvement of password authenticated key exchange based on RSA for imbalanced wireless networks," IEICE Trans. Commun., vol.E88-B, no.11, pp.4370-4372, Nov. 2005.
    • (2005) IEICE Trans. Commun. , vol.E88-B , Issue.11 , pp. 4370-4372
    • Yang, C.C.1    Wang, R.C.2
  • 11
    • 33747596213 scopus 로고    scopus 로고
    • Cryptanalysis of two password authenticated key exchange protocols based on RSA
    • DOI 10.1109/LCOMM.2006.1665131
    • T. Cao and D. Lin, "Cryptanalysis of two password authenticated key exchange protocols based on RSA," IEEE Commun. Lett., vol.10, no.8, pp.623-625, 2006. (Pubitemid 44263640)
    • (2006) IEEE Communications Letters , vol.10 , Issue.8 , pp. 623-625
    • Cao, T.1    Lin, D.2
  • 13
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Comput. Secur., vol.22, no.1, pp.68-72, 2003.
    • (2003) Comput. Secur. , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 14
    • 0141642166 scopus 로고    scopus 로고
    • On the Security of Some Password Authentication Protocols
    • B.T. Hsieh, H.M. Sun, and T. Hwang, "On the security of some password authentication protocols," Informatica, vol.14, no.2, pp.195-204, 2003. (Pubitemid 37189280)
    • (2003) Informatica , vol.14 , Issue.2 , pp. 195-204
    • Hsieh, B.-T.1    Sun, H.-M.2    Hwang, T.3
  • 15
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • C.L. Lin and T. Hwang, "A password authentication scheme with secure password updating," Comput. Secur., vol.22, no.1, pp.68-72, 2003.
    • (2003) Comput. Secur. , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining smartcard security under the threat of power analysis attacks," IEEE Trans. Comput., vol.51, no.5, pp.541-552, 2002. (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 20
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices
    • Security Protocols
    • R. Anderson and M. Kuhn, "Low cost attacks on tamper resistant devices," Proc. 5th International Workshop on Security Protocols, LNCS 1361, pp.125-136, April 1997. (Pubitemid 128023885)
    • (1998) Lecture Notes in Computer Science , Issue.1361 , pp. 125-136
    • Anderson, R.J.1    Kuhn, M.2
  • 24
    • 36849063206 scopus 로고    scopus 로고
    • Security services in group communications over wireless infrastructure mobile ad hoc, and wireless sensor networks
    • DOI 10.1109/MWC.2007.4396938
    • P. Sakarindr and N. Ansari, "Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks," IEEE Wirel. Commun., vol.14, no.5, pp.8-20, 2007. (Pubitemid 350231649)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.5 , pp. 8-20
    • Sakarindr, P.1    Ansari, N.2
  • 25
    • 35048844178 scopus 로고    scopus 로고
    • Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography
    • C. Zouridaki, B.L. Mark, K. Gaj, and R.K. Thomas, "Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography," Lect. Notes Comput. Sci., 3093, pp.232-245, 2004.
    • (2004) Lect. Notes Comput. Sci. , vol.3093 , pp. 232-245
    • Zouridaki, C.1    Mark, B.L.2    Gaj, K.3    Thomas, R.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.