메뉴 건너뛰기




Volumn 38, Issue 2, 2012, Pages 381-387

An improved dynamic ID-based remote user authentication with key agreement scheme

Author keywords

[No Author keywords available]

Indexed keywords

BROKEN DOWN; GUESSING ATTACKS; ID-BASED; IMPERSONATION ATTACK; KEY AGREEMENT SCHEME; KEY EXCHANGE; REMOTE USER AUTHENTICATION; REMOTE USER AUTHENTICATION SCHEMES; SECRET INFORMATION; SECURITY FLAWS;

EID: 84858082073     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2011.11.010     Document Type: Article
Times cited : (121)

References (15)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport Password authentication with insecure communication Commun ACM 24 11 1981 770 772
    • (1981) Commun ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0026153410 scopus 로고
    • Remote password authentication with smart card
    • C.C. Chang, and T.C. Wu Remote password authentication with smart card Comput. Digital Tech., IEE Proc. E 138 3 1991 165 168
    • (1991) Comput. Digital Tech., IEe Proc. e , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 3
    • 0036429021 scopus 로고    scopus 로고
    • An enhancement of timestamp-based password authentication scheme
    • DOI 10.1016/S0167-4048(02)01118-5
    • L. Fan, J.H. Li, and H.W. Zhu An enhancement of timestamp-based password authentication scheme Comput Secur 21 7 2002 665 667 (Pubitemid 35355526)
    • (2002) Computers and Security , vol.21 , Issue.7 , pp. 665-667
    • Fan, L.1    Li, J.-H.2    Zhu, H.-W.3
  • 4
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • M.L. Das, A. Saxana, and V.P. Gulati A dynamic ID-based remote user authentication scheme IEEE Trans Consum Electr 50 2 2004 629 631
    • (2004) IEEE Trans Consum Electr , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxana, A.2    Gulati, V.P.3
  • 5
    • 33751197641 scopus 로고    scopus 로고
    • Comment on a dynamic ID-based remote user authentication scheme
    • A.K. Awasthi Comment on a dynamic ID-based remote user authentication scheme Trans Cryptol 1 2 2004 15 16
    • (2004) Trans Cryptol , vol.1 , Issue.2 , pp. 15-16
    • Awasthi, A.K.1
  • 6
    • 24144494609 scopus 로고    scopus 로고
    • Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards
    • W.C. Ku, and S.T. Chang Impersonation attacks on a dynamic ID-based remote user authentication scheme using smart cards IEICS Trans Commun E88-B 5 2005 2165 2167
    • (2005) IEICS Trans Commun , vol.88 E-B , Issue.5 , pp. 2165-2167
    • Ku, W.C.1    Chang, S.T.2
  • 8
    • 70350724053 scopus 로고    scopus 로고
    • Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme
    • M. Misbahuddin, and C.S. Bindu Cryptanalysis of Liao-Lee-Hwang's dynamic ID scheme Int J Netw Secur 2 6 2008 211 213
    • (2008) Int J Netw Secur , vol.2 , Issue.6 , pp. 211-213
    • Misbahuddin, M.1    Bindu, C.S.2
  • 9
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Y.Y. Wang, J.Y. Liu, F.X. Xiao, and J. Dan A more efficient and secure dynamic ID-based remote user authentication scheme Comput Commun 4 32 2009 583 585
    • (2009) Comput Commun , vol.4 , Issue.32 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.X.3    Dan, J.4
  • 10
    • 58049197989 scopus 로고    scopus 로고
    • Two efficient two-factor authenticated key exchange protocols in public wireless LANs
    • W.S. Juang, and J.L. Wu Two efficient two-factor authenticated key exchange protocols in public wireless LANs Comput Electr Eng 1 35 2009 33 40
    • (2009) Comput Electr Eng , vol.1 , Issue.35 , pp. 33-40
    • Juang, W.S.1    Wu, J.L.2
  • 11
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient and secure dynamic ID-based remote user authentication scheme'
    • M.K. Khan, S.K. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a 'more efficient and secure dynamic ID-based remote user authentication scheme' Comput Commun 34 3 2011 305 309
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 12
    • 77950629746 scopus 로고    scopus 로고
    • An efficient anonymous authentication mechanism for delay tolerant networks
    • R. Su, and Z.F. Cao An efficient anonymous authentication mechanism for delay tolerant networks Comput Electr Eng 3 36 2010 435 441
    • (2010) Comput Electr Eng , vol.3 , Issue.36 , pp. 435-441
    • Su, R.1    Cao, Z.F.2
  • 13
    • 79956064800 scopus 로고    scopus 로고
    • A user friendly authentication scheme with anonymity for wireless communications
    • E.J. Yoon, K.Y. Yoo, and K.S. Ha A user friendly authentication scheme with anonymity for wireless communications Comput Electr Eng 3 37 2011 356 364
    • (2011) Comput Electr Eng , vol.3 , Issue.37 , pp. 356-364
    • Yoon, E.J.1    Yoo, K.Y.2    Ha, K.S.3
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans Comput 5 51 2002 541 552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.