메뉴 건너뛰기




Volumn 41, Issue 1, 2012, Pages 53-59

A secure password-based remote user authentication scheme without smart cards

Author keywords

Impersonation attack; Mutual authentication; Password based; Remote access; Tamper resistant

Indexed keywords


EID: 84872223681     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.41.1.975     Document Type: Article
Times cited : (31)

References (18)
  • 1
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, Y. M. Tseng. "An efficient and practical solution to remote authentication: smart card," Computers and Security 21(4) (2002) 372-375.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 3
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31 (4) (1985) 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 4
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. I. Fan, Y. C. Chan, Z. K. Zhang. Robust remote authentication scheme with smart cards, Computers & Security 24 (8) (2005) 619-628.
    • (2005) Computers & Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 5
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang, L. H. Li. A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (1) (2000) 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 6
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • W. S. Juang. Efficient password authenticated key agreement using smart cards, Computers & Security 23 (2) (2004) 167-173.
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.S.1
  • 7
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of a flexible biometrics remote user authentication scheme
    • M. K. Khan, J. S. Zhang. Improving the security of a flexible biometrics remote user authentication scheme, Computer Standards & Interfaces 29 (1) (2007) 82-85.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.S.2
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport. Password authentication with insecure communication, Communications of the ACM 24 (1981) 770-772.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 10
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • C. T. Li, C. C. Lee. A robust remote user authentication scheme using smart card, Information Technology and Control 40 (2011) 236-245.
    • (2011) Information Technology and Control , vol.40 , pp. 236-245
    • Li, C.T.1    Lee, C.C.2
  • 11
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • J. Y. Liu, A. M. Zhou, M. X. Gao. A new mutual authentication scheme based on nonce and smart cards, Computer Communications 31 (10) (2008) 2205-2209.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2205-2209
    • Liu, J.Y.1    Zhou, A.M.2    Gao, M.X.3
  • 12
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • H. S. Rhee, J. O. Kwon, D. H. Lee. A remote user authentication scheme without using smart cards, Computer Standards & Interfaces 31 (1) (2009) 6-13.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 14
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote use authentication scheme using smart cards
    • H. M. Sun. An efficient remote use authentication scheme using smart cards, IEEE Transactions on Consumer Electronics 46 (4) (2000) 958-961.
    • (2000) IEEE Transactions On Consumer Electronics , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.M.1
  • 15
    • 61849087915 scopus 로고    scopus 로고
    • Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
    • D. Z. Sun, J. P. Huai, J. Z. Sun, J. X. Li. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards, Computer Communications 32 (6) (2009) 1015-1017.
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1015-1017
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Li, J.X.4
  • 16
    • 70449574216 scopus 로고    scopus 로고
    • Security analysis of two password authentication schemes
    • International Conference on, 296-300, 2009 Eighth International Conference on Mobile Business
    • Tan. Security analysis of two password authentication schemes, Mobile Business, International Conference on, 296-300, 2009 Eighth International Conference on Mobile Business, 2009.
    • (2009) Mobile Business
  • 17
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • X. M. Wang, W. F. Zhang, J. S. Zhang, M. K. Khan. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards & Interfaces 29 (5) (2007) 507-512.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Zhang, J.S.3    Khan, M.K.4
  • 18
    • 3042731523 scopus 로고    scopus 로고
    • Cryptanalysis of a user friendly remote authentication scheme with smart cards
    • C. C. Yang, R. C. Wang. Cryptanalysis of a user friendly remote authentication scheme with smart cards, Computers and Security 23 (5) (2004) 425-427.
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 425-427
    • Yang, C.C.1    Wang, R.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.