메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 64-67

Guessing attacks on strong-password authentication protocol

Author keywords

Authentication; Cryptography; Guessing attack; Hash function; Password

Indexed keywords

AUTHENTICATION PROTOCOLS; DENIAL OF SERVICE ATTACKS; GUESSING ATTACKS; IMPERSONATION ATTACK; ONE-TIME PASSWORDS; PASSWORD; PASSWORD AUTHENTICATION;

EID: 84875095444     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (46)

References (27)
  • 1
    • 0141946906 scopus 로고    scopus 로고
    • Security on the Internet: Authenticating the user
    • J. Botting, "Security on the Internet: Authenticating the user," Telecommunications, vol. 31, no. 12, pp. 77-80, 1997.
    • (1997) Telecommunications , vol.31 , Issue.12 , pp. 77-80
    • Botting, J.1
  • 2
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocols
    • November
    • C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E85-B, pp. 2519-2521, November 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 3
    • 80054052709 scopus 로고    scopus 로고
    • Weaknesses of a remote user password authentication scheme using smart card
    • D. He, J. Chen, and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card," International Journal of Network Security, vol. 13, no. 1, pp. 58-60, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 58-60
    • He, D.1    Chen, J.2    Hu, J.3
  • 4
    • 80054052709 scopus 로고    scopus 로고
    • Weaknesses of a remote user password authentication scheme using smart card
    • D. He, J. Chen, and J. Hu, "Weaknesses of a remote user password authentication scheme using smart card," International Journal of Network Security, vol. 13, no. 1, pp. 58-60, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 58-60
    • He, D.1    Chen, J.2    Hu, J.3
  • 5
    • 0000694693 scopus 로고    scopus 로고
    • A remote password authentication scheme based on the digital signature method
    • M. S. Hwang, "A remote password authentication scheme based on the digital signature method," International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
    • (1999) International Journal of Computer Mathematics , vol.70 , pp. 657-666
    • Hwang, M.S.1
  • 6
  • 7
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • M. S. Hwang, C. C. Lee, and Y. L. Tang, "An improvement of SPLICE/AS in WIDE against guessing attack," International Journal of Informatica, vol. 12, no. 2, pp. 297-302, 2001.
    • (2001) International Journal of Informatica , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 8
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 9
    • 84875286190 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme with smart card
    • M. Kumar, "An enhanced remote user authentication scheme with smart card," International Journal of Network Security, vol. 10, no. 3, pp. 175-184, 2010.
    • (2010) International Journal of Network Security , vol.10 , Issue.3 , pp. 175-184
    • Kumar, M.1
  • 10
    • 77958081838 scopus 로고    scopus 로고
    • A new secure remote user authentication scheme with smart cards
    • M. Kumar, "A new secure remote user authentication scheme with smart cards," International Journal of Network Security, vol. 11, no. 2, pp. 88-93, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.2 , pp. 88-93
    • Kumar, M.1
  • 11
    • 84866619118 scopus 로고    scopus 로고
    • An improved efficient remote password authentication scheme with smart card over insecure networks
    • M. Kumar, M. K. Gupta, and S. Kumari, "An improved efficient remote password authentication scheme with smart card over insecure networks," International Journal of Network Security, vol. 13, no. 3, pp. 167-177, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 167-177
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 12
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multiserver architecture using neural networks
    • L. H. Li, I. C. Lin, and M. S. Hwang, "A remote password authentication scheme for multiserver architecture using neural networks," IEEE Transactions on Neural Networks, vol. 12, no. 6, pp. 1498-1504, 2001.
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 13
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I. E. Liao, C. C. Lee, and M. S. Hwang, "A password authentication scheme over insecure networks," Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 14
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • September
    • C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IE-ICE Transactions on Communications, vol. E84-B, pp. 2622-2627, September 2001.
    • (2001) IE-ICE Transactions on Communications , vol.E84-B , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 16
    • 0037211327 scopus 로고    scopus 로고
    • A new remote user authentication scheme for multiserver architecture
    • I. C. Lin, M. S. Hwang, and L. H. Li, "A new remote user authentication scheme for multiserver architecture," Future Generation Computer Systems, vol. 19, no. 1, pp. 13-22, 2003.
    • (2003) Future Generation Computer Systems , vol.19 , Issue.1 , pp. 13-22
    • Lin, I.C.1    Hwang, M.S.2    Li, L.H.3
  • 17
    • 84858212560 scopus 로고    scopus 로고
    • An efficient password authentication scheme for smart card
    • R. Ramasamy and A. P. Muniyandi, "An efficient password authentication scheme for smart card," International Journal of Network Security, vol. 14, no. 3, pp. 180-186, 2012.
    • (2012) International Journal of Network Security , vol.14 , Issue.3 , pp. 180-186
    • Ramasamy, R.1    Muniyandi, A.P.2
  • 18
  • 19
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • J. J. Shen, C. W. Lin, and M. S. Hwang, "A modified remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 49, no. 2, pp. 414-416, 2003.
    • (2003) IEEE Transactions on Consumer Electronics , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 20
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • J. J. Shen, C. W. Lin, and M. S. Hwang, "Security enhancement for the timestamp-based password authentication scheme using smart cards," Computers & Security, vol. 22, no. 7, pp. 591-595, 2003.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 21
    • 80054068340 scopus 로고    scopus 로고
    • Inverse cookie-based virtual password authentication protocol
    • S. K. Sood, A. K. Sarje, and K. Singh, "Inverse cookie-based virtual password authentication protocol," International Journal of Network Security, vol. 13, no. 2, pp. 98-108, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.2 , pp. 98-108
    • Sood, S.K.1    Sarje, A.K.2    Singh, K.3
  • 23
    • 0141938442 scopus 로고    scopus 로고
    • An impersonation attack on one-time password authentication protocol OSPA
    • T. Tsuji and A. Shimizu, "An impersonation attack on one-time password authentication protocol OSPA," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2182-2185, 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.7 , pp. 2182-2185
    • Tsuji, T.1    Shimizu, A.2
  • 24
    • 33645274667 scopus 로고    scopus 로고
    • A secure strong-password authentication protocol
    • H. C. Wu, M. S. Hwang, and C. H. Liu, "A secure strong-password authentication protocol," Fundamenta Informaticae, vol. 68, pp. 399-406, 2005.
    • (2005) Fundamenta Informaticae , vol.68 , pp. 399-406
    • Wu, H.C.1    Hwang, M.S.2    Liu, C.H.3
  • 25
    • 0742306164 scopus 로고    scopus 로고
    • The security of the improvement on the methods for protecting password transmission
    • C. C. Yang, T. Y. Chang, and M. S. Hwang, "The security of the improvement on the methods for protecting password transmission," Informatica, vol. 14, no. 4, pp. 551-558, 2003.
    • (2003) Informatica , vol.14 , Issue.4 , pp. 551-558
    • Yang, C.C.1    Chang, T.Y.2    Hwang, M.S.3
  • 26
    • 0142007845 scopus 로고    scopus 로고
    • Security enhancement for protecting password transmission
    • C. C. Yang, T. Y. Chang, J. W. Li, and M. S. Hwang, "Security enhancement for protecting password transmission," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2178-2181, 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.7 , pp. 2178-2181
    • Yang, C.C.1    Chang, T.Y.2    Li, J.W.3    Hwang, M.S.4
  • 27
    • 84863285679 scopus 로고    scopus 로고
    • Mutual authentication scheme with smart cards and password under trusted computing
    • L. Yang, J. F. Ma, and Q. Jiang, "Mutual authentication scheme with smart cards and password under trusted computing," International Journal of Network Security, vol. 14, no. 3, pp. 156-163, 2012.
    • (2012) International Journal of Network Security , vol.14 , Issue.3 , pp. 156-163
    • Yang, L.1    Ma, J.F.2    Jiang, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.