메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATED KEY AGREEMENT PROTOCOLS; AUTHENTICATION PROTOCOLS; AUTHENTICATION SCHEME; DENIAL OF SERVICE ATTACKS; IDENTITY-BASED; INSIDER ATTACK; KEY AGREEMENT SCHEME; MAN IN THE MIDDLE ATTACKS; MODULAR EXPONENTIATION; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD AUTHENTICATION; PRIVATE KEY; SECURITY ENHANCEMENTS; SESSION KEY;

EID: 84862952685     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2011.6108113     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 1
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • June
    • R. Song. Advanced smart card based password authentication protocol. Computer Standards & Interfaces, Volume 32, Issue 4, June 2010, Pages 321-325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.4 , pp. 321-325
    • Song, R.1
  • 3
    • 79959762596 scopus 로고    scopus 로고
    • Secure smart care based password authentication scheme with user anonymity
    • C. Li. Secure smart care based password authentication scheme with user anonymity. Information Technology and Control, Vol. 40, No. 2, pp.157-162, 2011.
    • (2011) Information Technology and Control , vol.40 , Issue.2 , pp. 157-162
    • Li, C.1
  • 4
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • DOI 10.1016/j.csi.2006.11.005, PII S0920548906001322
    • X.M. Wang, W.F. Zhang, J.S. Zhang, M.K. Khan. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces, 29(5), 2007, 507-512. (Pubitemid 46771122)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.-M.1    Zhang, W.-F.2    Zhang, J.-S.3    Khan, M.K.4
  • 5
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • June
    • J. Xu, W. Zhu, and D. Feng. An improved smart card based password authentication scheme with provable security.Computer Standards & Interfaces, Volume 31, Issue 4, June 2009, Pages 723-728.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.2    Feng, D.3
  • 7
    • 4043171870 scopus 로고    scopus 로고
    • A smart card based remote scheme for password authentication in multiserver Internet services
    • June
    • W. Tsaur, C. Wu, and W. Lee. A smart card based remote scheme for password authentication in multiserver Internet services. Computer Standards & Interfaces, Volume 27, June 2004, Pages 39-51.
    • (2004) Computer Standards & Interfaces , vol.27 , pp. 39-51
    • Tsaur, W.1    Wu, C.2    Lee, W.3
  • 8
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • March
    • W. Juang. Efficient password authenticated key agreement using smart cards. Computers & Security, Volume 23, Issue 2, March 2004, Pages 167-173.
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.1
  • 9
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H.Y. Chien, J.K. Jan, and Y.M. Tseng. An efficient and practical solution to remote authentication: smart card. Computers and Security, vol.21, no.4, pp.372-375, 2002.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 10
    • 68849109202 scopus 로고    scopus 로고
    • Two improved two-party identity-based authenticated key agreement protocols
    • M. Hölbl, and T. Welzer. Two improved two-party identity-based authenticated key agreement protocols. Computer Standards & Interfaces, Volume 31, 2009, Pages 1056-1060.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 1056-1060
    • Hölbl, M.1    Welzer, T.2
  • 11
    • 84862930748 scopus 로고    scopus 로고
    • Improvements on two password-based authentication protocols
    • ePrint Archive
    • Y. Chen, J. Chou, and C. Huang. Improvements on two password-based authentication protocols. Cryptology ePrint Archive, 2010.
    • (2010) Cryptology
    • Chen, Y.1    Chou, J.2    Huang, C.3
  • 12
    • 79955722723 scopus 로고    scopus 로고
    • Security weaknesses of authenticated key agreement protocols
    • 31 July
    • P. Nose. Security weaknesses of authenticated key agreement protocols. Information Processing Letters Volume 111, Issue 14, 31 July 2011, Pages 687-696.
    • (2011) Information Processing Letters , vol.111 , Issue.14 , pp. 687-696
    • Nose, P.1
  • 14
    • 33947405259 scopus 로고    scopus 로고
    • An efficient two-party identity-based key exchange protocol
    • Y.M. Tseng. An efficient two-party identity-based key exchange protocol. Informatica 18 (1) (2007) 125-136.
    • (2007) Informatica , vol.18 , Issue.1 , pp. 125-136
    • Tseng, Y.M.1
  • 16
    • 77951175561 scopus 로고    scopus 로고
    • Master's Thesis. Laboratory of Cryptography and Information Security Department of Computer Science and Information Engineering. National Central University, Chung-Li, Taiwan 320, Republic of China
    • H. Shih. Cryptanalysis on Two Password Authentication Schemes. Master's Thesis. Laboratory of Cryptography and Information Security Department of Computer Science and Information Engineering. National Central University, Chung-Li, Taiwan 320, Republic of China.
    • Cryptanalysis on Two Password Authentication Schemes
    • Shih, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.