메뉴 건너뛰기




Volumn 25, Issue 12, 2012, Pages 1639-1644

Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme

Author keywords

anonymity; authentication; cryptography; password; protocol

Indexed keywords

ANONYMITY; FORWARD SECRECY; HOME NETWORKS; ID-BASED; KEY AGREEMENT SCHEME; PASSWORD; PASSWORD GUESSING; REMOTE SERVERS; REMOTE USER AUTHENTICATION; SPOOFING ATTACKS; USER ANONYMITY; USER AUTHENTICATION SCHEME;

EID: 84870350603     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2428     Document Type: Article
Times cited : (42)

References (19)
  • 1
    • 33751197641 scopus 로고    scopus 로고
    • Comment on a dynamic id-based remote user authentication scheme
    • Awasthi AK,. Comment on a dynamic id-based remote user authentication scheme. Transaction on Cryptology 2004; 1 (2): 15-16.
    • (2004) Transaction on Cryptology , vol.1 , Issue.2 , pp. 15-16
    • Awasthi, A.K.1
  • 3
    • 24144494609 scopus 로고    scopus 로고
    • Impersonation attacks on a dynamic id-based remote user authentication scheme using smart cards
    • Ku WC, Chang ST,. Impersonation attacks on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions 2005; E88-B (5): 2165-2167.
    • (2005) IEICE Transactions , vol.88 , Issue.5 , pp. 2165-2167
    • Ku, W.C.1    Chang, S.T.2
  • 6
    • 58049197989 scopus 로고    scopus 로고
    • Two efficient two-factor authenticated key exchange protocols in public wireless lans
    • Juang WS, Wu JL,. Two efficient two-factor authenticated key exchange protocols in public wireless lans. Computers and Electrical Engineering 2009; 1 (35): 33-40.
    • (2009) Computers and Electrical Engineering , vol.1 , Issue.35 , pp. 33-40
    • Juang, W.S.1    Wu, J.L.2
  • 7
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic id-based remote user authentication scheme
    • Wang YY, Liu JY, Xiao FX, et al,. A more efficient and secure dynamic id-based remote user authentication scheme. Computer Communications 2009; 4 (32): 583-585.
    • (2009) Computer Communications , vol.4 , Issue.32 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.X.3
  • 8
    • 77950629746 scopus 로고    scopus 로고
    • An efficient anonymous authentication mechanism for delay tolerant networks
    • Su R, Cao ZF,. An efficient anonymous authentication mechanism for delay tolerant networks. Computers and Electrical Engineering 2010; 3 (36): 435-441.
    • (2010) Computers and Electrical Engineering , vol.3 , Issue.36 , pp. 435-441
    • Su, R.1    Cao, Z.F.2
  • 9
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'
    • Khan MK, Kim SK, Alghathbar K,. Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'. Computer Communications 2011; 34 (3): 305-309.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 10
    • 79956064800 scopus 로고    scopus 로고
    • A user friendly authentication scheme with anonymity for wireless communications
    • Yoon EJ, Yoo KY, Ha KS,. A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering 2011; 3 (37): 356-364.
    • (2011) Computers and Electrical Engineering , vol.3 , Issue.37 , pp. 356-364
    • Yoon, E.J.1    Yoo, K.Y.2    Ha, K.S.3
  • 11
    • 84858082073 scopus 로고    scopus 로고
    • An improved dynamic id-based remote user authentication with key agreement scheme
    • Wen F, Li X,. An improved dynamic id-based remote user authentication with key agreement scheme. Computers and Electrical Engineering 2011; 38 (2): 381-387.
    • (2011) Computers and Electrical Engineering , vol.38 , Issue.2 , pp. 381-387
    • Wen, F.1    Li, X.2
  • 12
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He D, Chen J, Zhang R,. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2011; 36 (3): 1989-1995.
    • (2011) Journal of Medical Systems , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 13
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • Chen C, He D, Chan S, et al,. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2010; 24 (3): 347-362.
    • (2010) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3
  • 15
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • Wang RC, Juang WS, Lei CL,. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 2011; 34 (3): 274-280.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 16
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • Wu S, Zhu Y, Pu Q,. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2011; 5 (2): 236-248.
    • (2011) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.1    Zhu, Y.2    Pu, Q.3
  • 17
    • 80054005779 scopus 로고    scopus 로고
    • A practical authentication protocol with anonymity for wireless access networks
    • Chen Y-C, Chuang S-C, Yeh L-Y, et al,. A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing 2011; 11 (10): 1366-1375.
    • (2011) Wireless Communications and Mobile Computing , vol.11 , Issue.10 , pp. 1366-1375
    • Chen, Y.-C.1    Chuang, S.-C.2    Yeh, L.-Y.3
  • 18
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in ngn
    • Vaidya B, Rodrigues JJ, Park JH,. User authentication schemes with pseudonymity for ubiquitous sensor network in ngn. International Journal of Communication Systems 2010; 23 (9-10): 1201-1222.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.910 , pp. 1201-1222
    • Vaidya, B.1    Rodrigues, J.J.2    Park, J.H.3
  • 19
    • 79953304485 scopus 로고    scopus 로고
    • Cryptanalysis of a simple three-party password-based key exchange protocol
    • Yoon EJ, Yoo KY,. Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems 2011; 24 (4): 532-542.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 532-542
    • Yoon, E.J.1    Yoo, K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.