메뉴 건너뛰기




Volumn 10, Issue 3, 2010, Pages 175-184

An enhanced remote user authentication scheme with smart card

Author keywords

Cryptology; Electronic authentication; Network security; Password; Smart card

Indexed keywords

CRYPTOLOGY; ELECTRONIC AUTHENTICATION; MUTUAL AUTHENTICATION; PASSWORD; REMOTE USER AUTHENTICATION SCHEMES; SECURE COMMUNICATIONS; SECURITY PROBLEMS; SECURITY REQUIREMENTS;

EID: 84875286190     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (34)

References (37)
  • 1
    • 1542647564 scopus 로고    scopus 로고
    • A remote user authentication scheme using smarts cards with forward secrecy
    • A. K. Awasthi and S. Lal,"A remote user authentication scheme using smarts cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 49, no. 4, pp. 1246-1248, 2003.
    • (2003) IEEE Transactions on Consumer Electronic , vol.49 , Issue.4 , pp. 1246-1248
    • Awasthi, A.K.1    Lal, S.2
  • 2
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • C. K. Chan and L. M. Cheng,"Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 46, pp. 992-993, 2000.
    • (2000) IEEE Transactions on Consumer Electronic , vol.46 , pp. 992-993
    • Chan, C.K.1    Cheng, L.M.2
  • 3
    • 0344197994 scopus 로고    scopus 로고
    • Some forgery attack on a remote user authentication scheme using smart cards
    • C. C. Chang and K. F. Hwang,"Some forgery attack on a remote user authentication scheme using smart cards," Informatics, vol. 14, no. 3, pp. 189-294, 2003.
    • (2003) Informatics , vol.14 , Issue.3 , pp. 189-294
    • Chang, C.C.1    Hwang, K.F.2
  • 4
    • 0037285263 scopus 로고    scopus 로고
    • Stolenverifier attack on two new strong-password authentication protocols
    • C. M. Chen and W. C. Ku,"Stolenverifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E85- B, no. 11, pp. 2519-2521, 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.11 , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 5
    • 33744776672 scopus 로고    scopus 로고
    • "A novel remote user authentication scheme using bilinear pairings
    • M. L. Das, A. Saxena, V. P. Gulati and D. B. Phatak,"A novel remote user authentication scheme using bilinear pairings," Computers and Security, vol. 25, no. 3, pp. 184-189, 2006.
    • (2006) Computers and Security , vol.25 , Issue.3 , pp. 184-189
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 6
    • 84874951959 scopus 로고    scopus 로고
    • Comments on Improved efficient rmote user authentication schemes
    • M. L. Das,"Comments on"Improved efficient rmote user authentication schemes"," International Journal of Network Security, vol. 6, no. 3, pp. 282-284, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.3 , pp. 282-284
    • Das, M.L.1
  • 7
    • 55149098062 scopus 로고    scopus 로고
    • Improvement of recently proposed remote user authentication schemes
    • G. Fang and G. Huang,"Improvement of recently proposed remote user authentication schemes," Cryptology ePrint Archive, 2006. (http://eprint.iacr.org/2006/200.pdf)
    • (2006) Cryptology ePrint Archive
    • Fang, G.1    Huang, G.2
  • 8
    • 0542444919 scopus 로고
    • Assigning driver's license number
    • J. A. Gallian,"Assigning driver's license number," Mathematics Magazine, vol. 64, pp. 13-22, 1991.
    • (1991) Mathematics Magazine , vol.64 , pp. 13-22
    • Gallian, J.A.1
  • 9
    • 4043125047 scopus 로고
    • Breaking the Missouri license code
    • J. A. Gallian,"Breaking the Missouri license code," The UMAP Journal, vol. 13, pp. 37-42, 1992.
    • (1992) The UMAP Journal , vol.13 , pp. 37-42
    • Gallian, J.A.1
  • 12
    • 47949101954 scopus 로고    scopus 로고
    • An improved remote user authentication scheme with smart cards using bilinear pairings
    • D. Giri and P. D. Srivastava,"An improved remote user authentication scheme with smart cards using bilinear pairings," Cryptology ePrint Archive, 2006. (http://eprint.iacr.org/2006/274.pdf)
    • (2006) Cryptology ePrint Archive
    • Giri, D.1    Srivastava, P.D.2
  • 13
    • 80054086407 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
    • D. Giri and P. D. Srivastava,"A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security," International Journal of Network Security, vol. 7, no. 2, pp. 223-234, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 223-234
    • Giri, D.1    Srivastava, P.D.2
  • 14
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon remote user authentication scheme using smart cards
    • C. H. Han and W. K. Shih,"Weaknesses and improvements of the Yoon remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Han, C.H.1    Shih, W.K.2
  • 15
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • M. S. Hwang and L. H. Li,"A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 46, no. 1, pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronic , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 16
  • 17
    • 78649423156 scopus 로고    scopus 로고
    • Standard Specifications for Passwordbased Public Key Cryptographic Techniques
    • IEEE P1363.2-D13
    • IEEE P1363.2-D13, Standard Specifications for Passwordbased Public Key Cryptographic Techniques, IEEE P1363 working group, 2004.
    • (2004) IEEE P1363 working group
  • 18
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • Y. L. Jia, A. M. Zhou, and M. X. Gao,"A new mutual authentication scheme based on nonce and smart cards," Computer Communications, vol. 31, no. 10, pp. 2205-2209, 2008.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2205-2209
    • Jia, Y.L.1    Zhou, A.M.2    Gao, M.X.3
  • 19
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport,"Password authentication with insecure communication," Communication of the ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Communication of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 20
    • 4043135280 scopus 로고    scopus 로고
    • Comment on a remote user authentication scheme using smart cards with forward secrecy
    • S. W. Lee, H. S. Kim and K. Y. Yoo,"Comment on a remote user authentication scheme using smart cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 576-577, 2004.
    • (2004) IEEE Transactions on Consumer Electronic , vol.50 , Issue.2 , pp. 576-577
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 22
    • 1542542636 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • K. C. Leung, L. M. Cheng, A. S. Fong and C. K. Chen,"Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 49, no. 3, pp. 1243-1245, 2003.
    • (2003) IEEE Transactions on Consumer Electronic , vol.49 , Issue.3 , pp. 1243-1245
    • Leung, K.C.1    Cheng, L.M.2    Fong, A.S.3    Chen, C.K.4
  • 23
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • H. T. Liaw, J. F. Lin and W. C. Wu,"An effcient and complete remote user authentication scheme using smart cards," Mathematical and Computer Modelling, vol. 44, pp. 223-228, 2006.
    • (2006) Mathematical and Computer Modelling , vol.44 , pp. 223-228
    • Liaw, H.T.1    Lin, J.F.2    Wu, W.C.3
  • 24
    • 4043060141 scopus 로고    scopus 로고
    • New remote user authentication scheme with smart cards
    • K. Manoj,"New remote user authentication scheme with smart cards," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 597-600, 2004.
    • (2004) IEEE Transactions on Consumer Electronic , vol.50 , Issue.2 , pp. 597-600
    • Manoj, K.1
  • 25
    • 4043118421 scopus 로고    scopus 로고
    • Some remarks on a remote user authentication scheme using smart cards with forward secrecy
    • K. Manoj,"Some remarks on a remote user authentication scheme using smart cards with forward secrecy," IEEE Transactions on Consumer Electronic, vol. 50, no. 2, pp. 615-618, 2004.
    • (2004) IEEE Transactions on Consumer Electronic , vol.50 , Issue.2 , pp. 615-618
    • Manoj, K.1
  • 26
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • C. J. Mitchell and l. Chen,"Comments on the S/KEY user authentication scheme," ACM Operating System Review, vol. 30, no. 4, pp. 12-16, 1996.
    • (1996) ACM Operating System Review , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 27
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • J. J. Shen, C. W. Lin and M. S. Hwang,"A modified remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronic, vol. 49, no. 2, pp. 414-416, 2003.
    • (2003) IEEE Transactions on Consumer Electronic , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 28
    • 51749125085 scopus 로고    scopus 로고
    • A new modified remote user authentication scheme using smart cards
    • Z. H. Shen,"A new modified remote user authentication scheme using smart cards," Applied Mathematics, vol. 23, no. 3, pp. 371-376, 2008.
    • (2008) Applied Mathematics , vol.23 , Issue.3 , pp. 371-376
    • Shen, Z.H.1
  • 29
  • 30
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: current status and key issues
    • C. S. Tsai, C. C. Lee and M. S. Hwang,"Password authentication schemes: current status and key issues," International Journal of Network Security, vol. 3, no. 2, pp. 101-115, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.S.1    Lee, C.C.2    Hwang, M.S.3
  • 31
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on the oneway function much harder to crack
    • M. Udi,"A simple scheme to make passwords based on the oneway function much harder to crack," Computer and Security, vol. 15, no. 2, pp. 171-176, 1996.
    • (1996) Computer and Security , vol.15 , Issue.2 , pp. 171-176
    • Udi, M.1
  • 32
    • 33746248709 scopus 로고    scopus 로고
    • A forward-secure user authentication scheme with smart cards
    • B. Wang and Z. Q. Li,"A forward-secure user authentication scheme with smart cards," International Journal of Network Security, vol. 3, no. 2, pp. 116-119, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 116-119
    • Wang, B.1    Li, Z.Q.2
  • 33
    • 70349819161 scopus 로고    scopus 로고
    • Cryptanalysis of two improved password authentication schemes us ing smart cards
    • R. C. Wang and C. C. Yang,"Cryptanalysis of two improved password authentication schemes using smart cards," International Journal of Network Security, vol. 3, no. 3, pp. 283-285, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 283-285
    • Wang, R.C.1    Yang, C.C.2
  • 34
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Y. Y. Wang, J. Y. Liu, F. Xiao, and J. Dan,"A more efficient and secure dynamic ID-based remote user authentication scheme," Computer Communications, vol. 32, no. 4, PP. 583-585, 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.3    Dan, J.4
  • 35
    • 0003256983 scopus 로고    scopus 로고
    • Shared authentication token secure against replay and weak key attack
    • S. M. Yen and K. H. Liao,"Shared authentication token secure against replay and weak key attack," Information Processing Letters, vol. 62, no. 2, pp. 77-80, 1997.
    • (1997) Information Processing Letters , vol.62 , Issue.2 , pp. 77-80
    • Yen, S.M.1    Liao, K.H.2
  • 36
    • 12244291938 scopus 로고    scopus 로고
    • An improvement of the Yang-Shieh password authentication schemes
    • C. C. Yang, R. C. Wang, and T. Y. Chang,"An improvement of the Yang-Shieh password authenti- cation schemes," Applied Mathematics and Computation, vol. 162, pp. 391-396, 2005.
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 391-396
    • Yang, C.C.1    Wang, R.C.2    Chang, T.Y.3
  • 37
    • 33748196456 scopus 로고    scopus 로고
    • Man-in-the-middle attack on the authentication of the user from the remote autonomous object
    • C. Y. Yang, C. C. Lee, and S. Y. Hsiao,"Man-in-the-middle attack on the authentication of the user from the remote autonomous object," International Journal of Network Security, vol. 1, no. 2, pp. 81-83, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 81-83
    • Yang, C.Y.1    Lee, C.C.2    Hsiao, S.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.