메뉴 건너뛰기




Volumn 31, Issue 6, 2012, Pages 791-798

Exploiting hash functions to intensify the remote user authentication scheme

Author keywords

Authentication; Hashing functions; Infringed account attack; Insider attack; Masquerading attacks; Resembling account attack

Indexed keywords

HASHING FUNCTIONS; INFRINGED ACCOUNT ATTACK; INSIDER ATTACK; MASQUERADING ATTACKS; RESEMBLING ACCOUNT ATTACK;

EID: 84865219379     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.06.001     Document Type: Article
Times cited : (31)

References (15)
  • 1
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication smart card
    • H.Y. Chien, J.K. Jan, and Y.M. Tseng An efficient and practical solution to remote authentication smart card Computers & Security 21 4 2002 372 375
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 2
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • Daojing He, Maode Ma, Yan Zhang, Chun Chen, and Jiajun Bu A strong user authentication scheme with smart cards for wireless communications Computer Communications 34 3 15 March 2011 367 374
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4    Bu, J.5
  • 3
    • 80054052709 scopus 로고    scopus 로고
    • Weaknesses of a remote user password authentication scheme using smart card
    • Debiao He, Jianhua Chen, and Jin Hu Weaknesses of a remote user password authentication scheme using smart card International Journal of Network Security 13 1 2011 58 60
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 58-60
    • He, D.1    Chen, J.2    Hu, J.3
  • 4
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • H.C. Hsiang, and W.K. Shih Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards Computer Communications 32 2009 649 652
    • (2009) Computer Communications , vol.32 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 5
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • J.J. Hwang, and T.C. Yeh Improvement on Peyravian-Zunic's password authentication schemes IEICE Transactions on Communications E85-B 4 April 2002 823 825
    • (2002) IEICE Transactions on Communications , vol.85 , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 8
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W.C. Ku, and S.M. Chen Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport Password authentication with insecure communication Communications of the ACM 24 11 1981 770 772
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 10
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Cheng-Chi Lee, Li-Hua Li, and Min-Shiang Hwang A remote user authentication scheme using hash functions ACM SIGOPS Operating System Review 36 4 October 2002 23 29
    • (2002) ACM SIGOPS Operating System Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.-C.1    Li, L.-H.2    Hwang, M.-S.3
  • 12
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 13
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • M. Peyravian, and N. Zunic Methods for protecting password transmission Computers & Security 19 5 2000 466 469
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 14
    • 0003256983 scopus 로고    scopus 로고
    • Shared authentication token secure against replay and weak key attack
    • S.M. Yen, and K.H. Liao Shared authentication token secure against replay and weak key attack Information Processing Letters 1997 78 80
    • (1997) Information Processing Letters , pp. 78-80
    • Yen, S.M.1    Liao, K.H.2
  • 15
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • E.J. Yoon, E.K. Ryu, and K.Y. Yoo Further improvement of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 2 2004 612 614
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.