메뉴 건너뛰기




Volumn , Issue , 2012, Pages 25-28

A reliable dynamic user-remote password authentication scheme over insecure network

Author keywords

Authentication; ID theft attack; Off line password guessing attack; Password

Indexed keywords

BRUTE FORCE; ID-THEFT ATTACK; INSECURE NETWORKS; ITS EFFICIENCIES; OFFLINE PASSWORD GUESSING ATTACK; OPERATION SYSTEM; PASSWORD; PASSWORD AUTHENTICATION; PASSWORD GUESSING ATTACK; PASSWORD-BASED AUTHENTICATION; REMOTE LOGIN; REPLAY ATTACK; USER AUTHENTICATION;

EID: 84860752648     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2012.203     Document Type: Conference Paper
Times cited : (8)

References (10)
  • 2
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.S., & Li, L.H., "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, 46 (1), pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 3
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password base remote user authentication scheme using smartcards
    • Ku, W.C., & Chen, S.M., "Weaknesses and improvements of an efficient password base remote user authentication scheme using smartcards," IEEE Transactions on Consumer Electronics, 50 (1), pp. 204-206, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-206
    • Ku, W.C.1    Chen, S.M.2
  • 4
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L. "Password authentication with insecure communication," Communications of the ACM, 24, 1981.
    • (1981) Communications of the ACM , vol.24
    • Lamport, L.1
  • 5
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee, C.C., Li, L.H., & Hwang, M.S., "A remote user authentication scheme using hash functions," ACM Operating Systems Review, 36 (4), pp. 23-29, 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 7
    • 33746686217 scopus 로고    scopus 로고
    • Password-based authentication and key distribution protocols with perfect forward secrecy
    • Sun, H.M., & Yen, H.T., "Password-Based Authentication and Key Distribution Protocols with Perfect Forward Secrecy," Journal of Computer System Science, 72, pp. 1002-1011, 2006.
    • (2006) Journal of Computer System Science , vol.72 , pp. 1002-1011
    • Sun, H.M.1    Yen, H.T.2
  • 8
    • 0142007144 scopus 로고    scopus 로고
    • A user friendly remote authentication scheme with smart cards
    • Wu, S., & Chieu, B., "A user friendly remote authentication scheme with smart cards," Computers and Security, 22 (6), pp. 547-550, 2003.
    • (2003) Computers and Security , vol.22 , Issue.6 , pp. 547-550
    • Wu, S.1    Chieu, B.2
  • 9
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang, Y.Y., Liu, J.Y., Xiao, F.X., & Dan, J., "A more efficient and secure dynamic ID-based remote user authentication scheme," Computer Communications, 32, pp. 583-585, 2009.
    • (2009) Computer Communications , vol.32 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.X.3    Dan, J.4
  • 10
    • 33646849220 scopus 로고    scopus 로고
    • An efficient password authentication schemes without using the server public key for grid computing
    • LNCS
    • Yoon, E., & Yoo, K., "An efficient password authentication schemes without using the server public key for grid computing," GCC 2005, LNCS 3795, pp. 149-154, 2005.
    • (2005) GCC 2005 , vol.3795 , pp. 149-154
    • Yoon, E.1    Yoo, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.