메뉴 건너뛰기




Volumn 7473 LNCS, Issue , 2012, Pages 181-188

On the security of an improved password authentication scheme based on ECC

Author keywords

Authentication protocol; Cryptanalysis; Elliptic curve cryptography; Smart card; User anonymity

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTANALYSIS; DENIAL OF SERVICE ATTACKS; ELLIPTIC CURVE CRYPTOGRAPHY; IMPROVED SCHEME; MOBILE APPLICATIONS; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD AUTHENTICATION; PASSWORD-BASED AUTHENTICATION; REMOTE USER AUTHENTICATION SCHEMES; SECURITY ANALYSIS; SECURITY GOALS; STOLEN VERIFIER ATTACK; USER ANONYMITY; VARIOUS ATTACKS;

EID: 84867658174     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34062-8_24     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song, R.: Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32(5), 321-325 (2010)
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 4
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • Yeh, K.H., Su, C., Lo, N.W., Li, Y., Hung, Y.X.: Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 83(12), 2556-2565 (2010)
    • (2010) Journal of Systems and Software , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.2    Lo, N.W.3    Li, Y.4    Hung, Y.X.5
  • 5
    • 84863239521 scopus 로고    scopus 로고
    • Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    • Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. Springer, Heidelberg
    • Ma, C.-G., Wang, D., Zhang, Q.-M.: Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol. 7154, pp. 141-152. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7154 , pp. 141-152
    • Ma, C.-G.1    Wang, D.2    Zhang, Q.-M.3
  • 6
    • 84860614830 scopus 로고    scopus 로고
    • A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy
    • Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. Springer, Heidelberg
    • Ma, C.-G., Wang, D., Zhao, P., Wang, Y.-H.: A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy. In: Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. LNCS, vol. 7234, pp. 199-211. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7234 , pp. 199-211
    • Ma, C.-G.1    Wang, D.2    Zhao, P.3    Wang, Y.-H.4
  • 7
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Klein, D.V.: Foiling the cracker: A survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5-14 (1990)
    • (1990) Proceedings of the 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 8
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • Wang, R.C., Juang, W.S., Lei, C.L.: Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 34(3), 274-280 (2011)
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 9
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • Wu, S.H., Zhu, Y.F., Pu, Q.: Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 5(2), 236-248 (2012)
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 10
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • doi:10.1007/s10916-012-9835-1
    • Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-012-9835-1
    • (2011) Journal of Medical Systems
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 11
    • 84873039261 scopus 로고    scopus 로고
    • Strong authentication scheme for telecare medicine information systems
    • doi:10.1007/s10916-011-9735-9
    • Pu, Q., Wang, J., Zhao, R.: Strong authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9735-9
    • (2011) Journal of Medical Systems
    • Pu, Q.1    Wang, J.2    Zhao, R.3
  • 12
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • doi:10.1007/s10916-011-9658-5
    • He, D.B., Chen, J.H., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems (2011), doi:10.1007/s10916-011-9658-5
    • (2011) Journal of Medical Systems
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 13
    • 84892506781 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • doi:10.1016/j.mcm.2011.07.001
    • Islam, S.H., Biswas, G.P.: Design of improved password authentication and update scheme based on elliptic curve cryptography. Mathematical and Computer Modelling (2011), doi:10.1016/j.mcm.2011.07.001
    • (2011) Mathematical and Computer Modelling
    • Islam, S.H.1    Biswas, G.P.2
  • 14
    • 84867658189 scopus 로고    scopus 로고
    • Comments on a password authentication and update scheme based on elliptic curve cryptography
    • ePrint Archive, Report 2011/411
    • He, D.B.: Comments on a password authentication and update scheme based on elliptic curve cryptography. Cryptology ePrint Archive, Report 2011/411 (2011), http://eprintH.iacr.org/2011/411.pdf
    • (2011) Cryptology
    • He, D.B.1
  • 16
    • 0344875575 scopus 로고    scopus 로고
    • Information hiding, anonymity and privacy: A modular approach
    • Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security 12(1), 3-36 (2004)
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2
  • 17
    • 84862952685 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
    • IEEE Press, New York
    • Roy, S., Das, A.K., Li, Y.: Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication. In: 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC), pp. 1-7. IEEE Press, New York (2011)
    • (2011) 2011 IEEE 30th International Performance Computing and Communications Conference (IPCCC) , pp. 1-7
    • Roy, S.1    Das, A.K.2    Li, Y.3
  • 18
    • 78049296439 scopus 로고    scopus 로고
    • A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
    • Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895-2903 (2010)
    • (2010) Information Sciences , vol.180 , Issue.15 , pp. 2895-2903
    • Cao, X.1    Kou, W.2    Du, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.