메뉴 건너뛰기




Volumn 40, Issue 2, 2011, Pages 157-162

Secure smart card based password authentication scheme with user anonymity

Author keywords

Network security; Password authentication; Smart card; Ubiquitous computing environments; User anonymity

Indexed keywords


EID: 79959762596     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.40.2.431     Document Type: Article
Times cited : (35)

References (25)
  • 1
    • 78049329614 scopus 로고    scopus 로고
    • Security enhan-cement on an improvement on two remote user authentication schemes using smart cards
    • April
    • T.H. Chen, H.C. Hsiang, W.K. Shih. Security enhan-cement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems, 27(4), April, 2011, 377-380.
    • (2011) Future Generation Computer Systems , vol.27 , Issue.4 , pp. 377-380
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 2
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.Y. Chien, J.K. Jan, Y.M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers and Security, 21(4), 2002, 372-375.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 3
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentica-tion scheme using smart cards
    • M.S. Hwang, L.H. Li. A new remote user authentica-tion scheme using smart cards, IEEE Transactions on Consumer Electronics, 46(1), 2000, 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 4
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • C.L. Hsu. Security of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards and Interfaces, 26(3), 2004, 167-169.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 5
    • 0002063278 scopus 로고    scopus 로고
    • Paramita wisdom password authentication scheme without verification tables
    • J.K. Jan, Y.Y. Chen. "Paramita wisdom" password authentication scheme without verification tables. The Journal of Systems and Software, 42(1), 1998, 45-57.
    • (1998) The Journal of Systems and Software , vol.42 , Issue.1 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 7
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11), 1981, 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 8
    • 79951813707 scopus 로고    scopus 로고
    • An extended certificate-based authentication and security protocol for mobile networks
    • C.C. Lee, I.E. Liao, M.S. Hwang. An extended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 38(1), 2009, 61-66.
    • (2009) Information Technology and Control , vol.38 , Issue.1 , pp. 61-66
    • Lee, C.C.1    Liao, I.E.2    Hwang, M.S.3
  • 11
    • 57049115409 scopus 로고    scopus 로고
    • Further improve-ment on a novel privacy preserving authentication and access control scheme for pervasive computing envi-ronments
    • C.T. Li, M.S. Hwang, Y.P. Chu. Further improve-ment on a novel privacy preserving authentication and access control scheme for pervasive computing envi-ronments. Computer Communications, 31(18), 2008, 4255-4258.
    • (2008) Computer Communications , vol.31 , Issue.18 , pp. 4255-4258
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 12
    • 46749099079 scopus 로고    scopus 로고
    • A secure and effi-cient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
    • C.T. Li, M.S. Hwang, Y.P. Chu. A secure and effi-cient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12), 2008, 2803-2814.
    • (2008) Computer Communications , vol.31 , Issue.12 , pp. 2803-2814
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 13
    • 70349788391 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards
    • Li. An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards. In Proceedings of The International Conference on Information Assurance and Security, IEEE CS, 2009, 517-529.
    • (2009) In Proceedings of the International Conference on Information Assurance and Security, IEEE CS , pp. 517-529
  • 14
    • 70349809938 scopus 로고    scopus 로고
    • Cryptanalysis of threshold pass-word authentication against guessing attacks in ad hoc networks
    • C.T. Li, Y.P. Chu. Cryptanalysis of threshold pass-word authentication against guessing attacks in ad hoc networks. International Journal of Network Security, 8(2), 2009, 166-168.
    • (2009) International Journal of Network Security , vol.8 , Issue.2 , pp. 166-168
    • Li, C.T.1    Chu, Y.P.2
  • 15
    • 69949155644 scopus 로고    scopus 로고
    • An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor net-works
    • C.T. Li, M.S. Hwang, Y.P. Chu. An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor net-works. International Journal of Innovative Computing, Information and Control, 5(8), 2009, 2107-2124.
    • (2009) International Journal of Innovative Computing, Information and Control , vol.5 , Issue.8 , pp. 2107-2124
    • Li, C.T.1    Hwang, M.S.2    Chu, Y.P.3
  • 16
    • 74349090986 scopus 로고    scopus 로고
    • A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks
    • C.T. Li, C.H. Wei, Y.H. Chin. A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks. International Jour-nal of Innovative Computing, Information and Cont-rol, 5(12(A)), 2009, 4715-4723.
    • (2009) International Jour-nal of Innovative Computing, Information and Cont-rol , vol.5 , Issue.12 A , pp. 4715-4723
    • Li, C.T.1    Wei, C.H.2    Chin, Y.H.3
  • 17
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • C.T. Li, M.S. Hwang. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 2010, 1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 18
    • 77952997430 scopus 로고    scopus 로고
    • An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards
    • C.T. Li, M.S. Hwang. An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. International Journal of Innovative Computing, Information and Control, 6(5), 2010, 2181-2188.
    • (2010) International Journal of Innovative Computing, Information and Control , vol.6 , Issue.5 , pp. 2181-2188
    • Li, C.T.1    Hwang, M.S.2
  • 19
    • 79957680480 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wire-less communications
    • C.T. Li, C.C. Lee. A novel user authentication and privacy preserving scheme with smart cards for wire-less communications. Mathematical and Computer Modelling, article in press, 2011.
    • (2011) Mathematical and Computer Modelling, Article in Press
    • Li, C.T.1    Lee, C.C.2
  • 20
    • 0036566408 scopus 로고    scopus 로고
    • Exami-ning smart-card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, R.H. Sloan. Exami-ning smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 2002, 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 21
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • R. Song. Advanced smart card based password authentication protocol. Computer Standards and In-terfaces, 32(5-6), 2010, 321-325.
    • (2010) Computer Standards and In-terfaces , vol.32 , Issue.5-6 , pp. 321-325
    • Song, R.1
  • 22
    • 33746686217 scopus 로고    scopus 로고
    • Password-based authentication and key distribution protocols with perfect forward secrecy
    • H.M. Sun, H.T. Yeh. Password-based authentication and key distribution protocols with perfect forward secrecy. Journal of Computer and System Sciences, 72(6), 2006, 1002-1011.
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.6 , pp. 1002-1011
    • Sun, H.M.1    Yeh, H.T.2
  • 23
    • 77952677593 scopus 로고    scopus 로고
    • Weaknesses and improvement of Hsu-Chuang's user identification scheme
    • J.L. Tsai. Weaknesses and improvement of Hsu-Chuang's user identification scheme. Information Technology and Control, 39(1), 2010, 48-50.
    • (2010) Information Technology and Control , vol.39 , Issue.1 , pp. 48-50
    • Tsai, J.L.1
  • 24
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient re-mote user authentication scheme using smart cards
    • X.M. Wang, W.F. Zhang, J.S. Zhang, M.K. Khan. Cryptanalysis and improvement on two efficient re-mote user authentication scheme using smart cards, Computer Standards and Interfaces, 29(5), 2007, 507-512.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Zhang, J.S.3    Khan, M.K.4
  • 25
    • 78751645363 scopus 로고    scopus 로고
    • Robust authenti-cation and key agreement scheme preserving the privacy of secret key
    • R.C. Wang, W.S. Juang, C.L. Lei. Robust authenti-cation and key agreement scheme preserving the privacy of secret key. Computer Communications, 34(3), 2011, 274-280.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.