메뉴 건너뛰기




Volumn 7, Issue 1, 2013, Pages 3-10

A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card

Author keywords

[No Author keywords available]

Indexed keywords

ELLIPTIC CURVE CRYPTOGRAPHY; INSIDER ATTACK; OFFLINE PASSWORD GUESSING; PASSWORD AUTHENTICATION; SECURE REMOTE ACCESS; SECURITY THREATS; UPDATE SCHEMES; USER ANONYMITY;

EID: 84877844458     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2012.0058     Document Type: Article
Times cited : (80)

References (25)
  • 1
    • 80052436479 scopus 로고    scopus 로고
    • A secure billing service with two-factor user authentication in wireless sensor networks
    • Li, C.T., Lee, C.C., Wang, L.J., Liu, C.J.: 'A secure billing service with two-factor user authentication in wireless sensor networks', Int. J. Innov. Comput., Inf. Control, 2011, 7, (8), pp. 4821-4831
    • (2011) Int. J. Innov. Comput., Inf. Control , vol.7 , Issue.8 , pp. 4821-4831
    • Li, C.T.1    Lee, C.C.2    Wang, L.J.3    Liu, C.J.4
  • 2
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • Li, C.T., Lee, C.C.: 'A novel user authentication and privacy preserving scheme with smart cards for wireless communications', Math. Comput. Model., 2012, 55, (1-2), pp. 35-44
    • (2012) Math. Comput. Model. , vol.55 , Issue.1-2 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 3
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • Li, C.T., Lee, C.C.: 'A robust remote user authentication scheme using smart card', Inf. Technol. Control, 2011, 40, (3), pp. 236-245
    • (2011) Inf. Technol. Control , vol.40 , Issue.3 , pp. 236-245
    • Li, C.T.1    Lee, C.C.2
  • 4
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: 'Password authentication with insecure communication', Commun. ACM, 1981, 24, (11), pp. 770-772
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 5
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-unic's password authentication schemes
    • Hwang, J.J., Yeh, T.C.: 'Improvement on Peyravian-unic's password authentication schemes', IEICE Trans. Commun., 2002, E85-B, (4), pp. 823-825
    • (2002) IEICE Trans. Commun. , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 6
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions
    • Lee, C.C., Li, L.H., Hwang, M.S.: 'A remote user authentication scheme using hash functions', ACM Oper. Syst. Rev., 2002, 36, (4), pp. 23-29
    • (2002) ACM Oper. Syst. Rev. , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 7
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • Lin, C.L., Hwang, T.: 'A password authentication scheme with secure password updating', Comput. Secur., 2003, 22, (1), pp. 68-72
    • (2003) Comput. Secur. , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 8
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • Peyravian, M., Zunic, N.: 'Methods for protecting password transmission', Comput. Secur., 2000, 19, (5), pp. 466-469
    • (2000) Comput. Secur. , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 9
    • 33144456748 scopus 로고    scopus 로고
    • Secure remote user access over insecure networks
    • DOI 10.1016/j.comcom.2005.07.025, PII S0140366405002999, Networks of Excellence
    • Peyravian, M., Jeffries, C.: 'Secure remote user access over insecure networks', Comput. Commun., 2006, 29, (5), pp. 660-667 (Pubitemid 43267620)
    • (2006) Computer Communications , vol.29 , Issue.5 , pp. 660-667
    • Peyravian, M.1    Jeffries, C.2
  • 10
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien, H.Y., Jan, J.K., Tseng, Y.M.: 'An efficient and practical solution to remote authentication: smart card', Comput. Secur., 2002, 21, (4), pp. 372-375
    • (2002) Comput. Secur. , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 11
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das, A.K.: 'Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards', IET Inf. Secur., 2011, 5, (3), pp. 145-151
    • (2011) IET Inf. Secur. , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 12
    • 0742268499 scopus 로고    scopus 로고
    • Security of Chien et al.'s remote user authentication scheme using smart cards
    • Hsu, C.L.: 'Security of Chien et al.'s remote user authentication scheme using smart cards', Comput. Stand. Interfaces, 2004, 26, (3), pp. 167-169
    • (2004) Comput. Stand. Interfaces , vol.26 , Issue.3 , pp. 167-169
    • Hsu, C.L.1
  • 13
    • 79959762596 scopus 로고    scopus 로고
    • Secure smart card based password authentication scheme with user anonymity
    • Li, C.T.: 'Secure smart card based password authentication scheme with user anonymity', Inf. Technol. Control, 2011, 40, (2), pp. 157-162
    • (2011) Inf. Technol. Control , vol.40 , Issue.2 , pp. 157-162
    • Li, C.T.1
  • 14
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication
    • Song, R.: 'Advanced smart card based password authentication', Comput. Stand. Interfaces, 2010, 32, (5-6), pp. 321-325
    • (2010) Comput. Stand. Interfaces , vol.32 , Issue.5-6 , pp. 321-325
    • Song, R.1
  • 15
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • Wang, R.C., Juang, W.S., Lei, C.L.: 'Robust authentication and key agreement scheme preserving the privacy of secret key', Comput. Commun., 2011, 34, (3), pp. 274-280
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 16
    • 84863369937 scopus 로고    scopus 로고
    • Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
    • Wang, H., Zhang, Y., Xiong, H., Qin, B.: 'Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme', IET Inf. Secur., 2012, 6, (1), pp. 20-27
    • (2012) IET Inf. Secur. , vol.6 , Issue.1 , pp. 20-27
    • Wang, H.1    Zhang, Y.2    Xiong, H.3    Qin, B.4
  • 18
    • 79959430513 scopus 로고    scopus 로고
    • One for all-all for one: Unifying standard differential power analysis attacks
    • Manqard, S., Oswald, E., Standaert, F.X.: 'One for all-all for one: unifying standard differential power analysis attacks', IET Inf. Secur., 2011, 5, (2), pp. 100-110
    • (2011) IET Inf. Secur. , vol.5 , Issue.2 , pp. 100-110
    • Manqard, S.1    Oswald, E.2    Standaert, F.X.3
  • 19
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: 'Examining smart-card security under the threat of power analysis attacks', IEEE Trans. Comput., 2002, 51, (5), pp. 541-552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 20
    • 84877858572 scopus 로고    scopus 로고
    • Design of improved password authentication and update scheme based on elliptic curve cryptography
    • in press
    • Islam, S.H., Biswas, G.P.: 'Design of improved password authentication and update scheme based on elliptic curve cryptography', Math. Comput. Model., 2012, in press
    • (2012) Math. Comput. Model.
    • Islam, S.H.1    Biswas, G.P.2
  • 22
    • 84872225263 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, (US Federal Information Processing Standard Publication)
    • National Institute of Standards and Technology: 'US department of commerce, secure hash standard' (US Federal Information Processing Standard Publication, 2002)
    • (2002) US Department of Commerce, Secure Hash Standard
  • 23
    • 84877845366 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. (US Federal Information Processing Standard Publication)
    • National Institute of Standards and Technology: 'US department of commerce, advanced encryption standard' (US Federal Information Processing Standard Publication, 2001)
    • (2001) US Department of Commerce, Advanced Encryption Standard
  • 24
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
    • Li, C.T., Hwang, M.S.: 'A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks', Inf. Sci., 2011, 181, (23), pp. 5333-5347
    • (2011) Inf. Sci. , vol.181 , Issue.23 , pp. 5333-5347
    • Li, C.T.1    Hwang, M.S.2
  • 25
    • 84863127067 scopus 로고    scopus 로고
    • A secure routing protocol with node selfishness resistance in MANETs
    • Li, C.T., Yang, C.C., Hwang, M.S.: 'A secure routing protocol with node selfishness resistance in MANETs', Int. J. Mob. Commun., 2012, 10, (1), pp. 103-118
    • (2012) Int. J. Mob. Commun. , vol.10 , Issue.1 , pp. 103-118
    • Li, C.T.1    Yang, C.C.2    Hwang, M.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.