메뉴 건너뛰기




Volumn 24, Issue 7, 2011, Pages 829-836

Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture

Author keywords

anonymity; authentication; dynamic ID; multi server; smart cards

Indexed keywords

ANONYMITY; AUTHENTICATION SCHEME; CYBERSPACES; DYNAMIC ID; MULTI-SERVER; MULTI-SERVER ARCHITECTURE; PASSWORD-BASED AUTHENTICATION; REMOTE USER AUTHENTICATION; REPLAY ATTACK; SECURITY ANALYSIS; SESSION KEY; SPOOFING ATTACKS; SYSTEM ACCESS;

EID: 79959763451     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1184     Document Type: Article
Times cited : (33)

References (17)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Lecture Notes in Computer Science Springer: Berlin
    • Bellare M, Pointcheval D, Rogaway P,. Authenticated key exchange secure against dictionary attacks. Proceedings of EUROCRYPT'2000. Lecture Notes in Computer Science, vol. 1807. Springer: Berlin, 2000; 139-155.
    • (2000) Proceedings of EUROCRYPT'2000 , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 19544367392 scopus 로고    scopus 로고
    • An efficient and secure multi-server password authentication scheme using smart card
    • Tokyo, Japan
    • Chang CC, Lee JS,. An efficient and secure multi-server password authentication scheme using smart card. Proceedings of the International Conference on Cyberworlds, Tokyo, Japan, 2004; 417-422.
    • (2004) Proceedings of the International Conference on Cyberworlds , pp. 417-422
    • Chang, C.C.1    Lee, J.S.2
  • 5
    • 69649092978 scopus 로고    scopus 로고
    • Provably secure password-based three-party key exchange with optimal message steps
    • Chien HY, Wu TC,. Provably secure password-based three-party key exchange with optimal message steps. The Computer Journal 2009; 52 (6): 646-655.
    • (2009) The Computer Journal , vol.52 , Issue.6 , pp. 646-655
    • Chien, H.Y.1    Wu, T.C.2
  • 7
    • 68849128250 scopus 로고    scopus 로고
    • Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
    • Hsiang HC, Shih WK,. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 2009; 31 (6): 1118-1123.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.6 , pp. 1118-1123
    • Hsiang, H.C.1    Shih, W.K.2
  • 8
    • 1942455353 scopus 로고    scopus 로고
    • Efficient multi-server password authenticated key agreement using smart cards
    • Juang WS,. Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics 2004; 50 (1): 251-255.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 251-255
    • Juang, W.S.1
  • 9
    • 24144494609 scopus 로고    scopus 로고
    • Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    • Ku WC, Chang ST,. Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Transactions on Communications 2005; 5: 2165-2167.
    • (2005) IEICE Transactions on Communications , vol.5 , pp. 2165-2167
    • Ku, W.C.1    Chang, S.T.2
  • 11
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multiserver architecture using neural networks
    • DOI 10.1109/72.963786, PII S1045922701095224
    • Li L, Lin I, Hwang M,. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks 2001; 12 (6): 1498-1504. (Pubitemid 33106055)
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.-H.1    Lin, I.-C.2    Hwang, M.-S.3
  • 12
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic ID based remote user authentication scheme for multi-server environment
    • Liao YP, Wang SS,. A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards and Interfaces 2009; 31 (2): 24-29.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.2 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 13
    • 0037211327 scopus 로고    scopus 로고
    • A new remote user authentication scheme for multi-server architecture
    • Lin IC, Hwang MS, Li LH,. A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems 2003; 19: 13-22.
    • (2003) Future Generation Computer Systems , vol.19 , pp. 13-22
    • Lin, I.C.1    Hwang, M.S.2    Li, L.H.3
  • 14
    • 49849096355 scopus 로고    scopus 로고
    • Efficient multi-server authentication scheme based on one-way hash function without verification table
    • Tsai JL,. Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers and Security 2008; 27: 115-121.
    • (2008) Computers and Security , vol.27 , pp. 115-121
    • Tsai, J.L.1
  • 15
    • 26844511307 scopus 로고    scopus 로고
    • An enhanced user authentication scheme for multi-server internet services
    • Tsuar WJ,. An enhanced user authentication scheme for multi-server internet services. Applied Mathematics and Computation 2005; 170: 258-266.
    • (2005) Applied Mathematics and Computation , vol.170 , pp. 258-266
    • Tsuar, W.J.1
  • 16
    • 26844506188 scopus 로고    scopus 로고
    • A flexible user authentication scheme for multi-server internet services
    • Tsuar WJ, Wu CC, Lee WB,. A flexible user authentication scheme for multi-server internet services. Lecture Notes in Computer Science 2001; 2093: 174-183.
    • (2001) Lecture Notes in Computer Science , vol.2093 , pp. 174-183
    • Tsuar, W.J.1    Wu, C.C.2    Lee, W.B.3
  • 17
    • 77956240963 scopus 로고    scopus 로고
    • A novel remote user authentication scheme for multi-server environment without using smart cards
    • Yeh KH, Lo NW,. A novel remote user authentication scheme for multi-server environment without using smart cards. International Journal of Innovative Computing, Information and Control 2010; 6 (8): 3467-3478.
    • (2010) International Journal of Innovative Computing, Information and Control , vol.6 , Issue.8 , pp. 3467-3478
    • Yeh, K.H.1    Lo, N.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.