메뉴 건너뛰기




Volumn 14, Issue 3, 2012, Pages 156-163

Mutual authentication scheme with smart cards and password under trusted computing

Author keywords

Authentication; Password; Remote attestation; Smart card; Trusted computing

Indexed keywords

KEY AGREEMENT; MUTUAL AUTHENTICATION; PASSWORD; PERSONAL INFORMATION; REMOTE ATTESTATION; SECURITY GOALS; TRUSTED COMPUTING; USER IDENTITY;

EID: 84863285679     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (33)

References (19)
  • 1
    • 0036302680 scopus 로고    scopus 로고
    • An ef-ficient, and practical solution to remote authentica-tion: Smart card
    • H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An ef-ficient, and practical solution to remote authentica-tion: Smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 2
    • 0037282439 scopus 로고    scopus 로고
    • A password authenti-cation scheme with secure password updating
    • L. L. Chun and T. L. Hwang, "A password authenti-cation scheme with secure password updating," Com-puters & Security, vol. 22, pp. 68-72, 2003.
    • (2003) Com-puters & Security , vol.22 , pp. 68-72
    • Chun, L.L.1    Hwang, T.L.2
  • 5
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 6
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and im-provements of an efficient password based remote user authentication scheme using smart cards
    • W. C. Ku and S. M. Chen, "Weaknesses and im-provements of an efficient password based remote user authentication scheme using smart cards," IEEE Transaction on Consumer Electronics, vol. 50, pp. 204-207, 2004.
    • (2004) IEEE Transaction on Consumer Electronics , vol.50 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 9
    • 24944506569 scopus 로고    scopus 로고
    • Trusted Computing: Strengths, Weak-nesses, and Further Opportunities for Enhancing Privacy
    • LNCS 3477, Springer-Verlag
    • S. Pearson, "Trusted Computing: Strengths, Weak-nesses, and Further Opportunities for Enhancing Privacy," iTrust 2005, LNCS 3477, pp. 305-320, Springer-Verlag, 2005.
    • (2005) iTrust 2005 , pp. 305-320
    • Pearson, S.1
  • 10
    • 61349102383 scopus 로고    scopus 로고
    • Trustworthy clients: Ex-tending TNC to web-based environments
    • S. Rehbocka and R. Hunt, "Trustworthy clients: Ex-tending TNC to web-based environments," Com-puter Communications, vol. 32, pp. 1006-1013, 2009.
    • (2009) Com-puter Communications , vol.32 , pp. 1006-1013
    • Rehbocka, S.1    Hunt, R.2
  • 12
  • 16
    • 84863275410 scopus 로고    scopus 로고
    • Trusted Computing Group, TCG Trusted Net-work Connect TNC Architecture for Interoperability XSpecification Version 1.2, 2007
    • Trusted Computing Group, TCG Trusted Net-work Connect TNC Architecture for Interoperability XSpecification Version 1.2, 2007. (http://www.trus-tedcomputinggroup.org)
  • 18
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. Yang, D. S. Wong, H. Wang, and X. Deng, "Two-factor mutual authentication based on smart cards and passwords," Journal of Computer and System Sciences, vol. 74, pp. 1160-1172, 2008.
    • (2008) Journal of Computer and System Sciences , vol.74 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.