메뉴 건너뛰기




Volumn 20, Issue , 2014, Pages 1-15

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks

Author keywords

Hierarchical wireless sensor networks; Non tamper resistant; Password authentication; Smart card; User anonymity

Indexed keywords

CRYPTOGRAPHY; SENSOR NODES; SMART CARDS;

EID: 84901198272     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2014.03.003     Document Type: Article
Times cited : (146)

References (87)
  • 1
    • 33750111807 scopus 로고    scopus 로고
    • An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    • Y. Cheng, and D. Agrawal An improved key distribution mechanism for large-scale hierarchical wireless sensor networks Ad Hoc Networks 5 1 2007 35 48
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 35-48
    • Cheng, Y.1    Agrawal, D.2
  • 2
    • 79957670763 scopus 로고    scopus 로고
    • A co-commitment based secure data collection scheme for tiered wireless sensor networks
    • Y. Zhao, Y. Zhang, Z. Qin, and T. Znati A co-commitment based secure data collection scheme for tiered wireless sensor networks J. Syst. Archit. 57 6 2011 655 662
    • (2011) J. Syst. Archit. , vol.57 , Issue.6 , pp. 655-662
    • Zhao, Y.1    Zhang, Y.2    Qin, Z.3    Znati, T.4
  • 3
    • 84878016515 scopus 로고    scopus 로고
    • A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks
    • G. Maia, D. Guidoni, A. Viana, A. Aquino, R. Mini, and A. Loureiro A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks Ad Hoc Networks 11 5 2013 1588 1602
    • (2013) Ad Hoc Networks , vol.11 , Issue.5 , pp. 1588-1602
    • Maia, G.1    Guidoni, D.2    Viana, A.3    Aquino, A.4    Mini, R.5    Loureiro, A.6
  • 4
    • 79960062320 scopus 로고    scopus 로고
    • An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks
    • R. Fan, D. He, X. Pan, and L. Ping An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks J. Zhejiang Univ. - Sci. C 12 7 2011 550 560
    • (2011) J. Zhejiang Univ. - Sci. C , vol.12 , Issue.7 , pp. 550-560
    • Fan, R.1    He, D.2    Pan, X.3    Ping, L.4
  • 5
    • 84862762845 scopus 로고    scopus 로고
    • A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • A.K. Das, P. Sharma, S. Chatterjee, and J.K. Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks J. Network Comput. Appl. 35 52 2012 1646 1656
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.52 , pp. 1646-1656
    • Das, A.K.1    Sharma, P.2    Chatterjee, S.3    Sing, J.K.4
  • 6
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • T.H. Chen, and W.K. Shih A robust mutual authentication protocol for wireless sensor networks ETRI J. 32 5 2010 704 712
    • (2010) ETRI J. , vol.32 , Issue.5 , pp. 704-712
    • Chen, T.H.1    Shih, W.K.2
  • 7
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • M.K. Khan, and K. Alghathbar Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks Sensors 10 3 2010 2450 2459
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 8
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu An enhanced two-factor user authentication scheme in wireless sensor networks Ad Hoc Sensor Wireless Networks 10 4 2010 361 371
    • (2010) Ad Hoc Sensor Wireless Networks , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 9
    • 79957702363 scopus 로고    scopus 로고
    • A secured authentication protocol for wireless sensor networks using elliptic curves cryptography
    • H. Yeh, T. Chen, P. Liu, T. Kim, and H. Wei A secured authentication protocol for wireless sensor networks using elliptic curves cryptography Sensors 11 5 2011 4767 4779
    • (2011) Sensors , vol.11 , Issue.5 , pp. 4767-4779
    • Yeh, H.1    Chen, T.2    Liu, P.3    Kim, T.4    Wei, H.5
  • 10
    • 79953085274 scopus 로고    scopus 로고
    • Two attacks on a two-factor user authentication in wireless sensor networks
    • C.-C. Lee, C.-T. Li, and S. der Chen Two attacks on a two-factor user authentication in wireless sensor networks Parallel Process. Lett. 21 1 2011 21 26
    • (2011) Parallel Process. Lett. , vol.21 , Issue.1 , pp. 21-26
    • Lee, C.-C.1    Li, C.-T.2    Der Chen, S.3
  • 11
    • 80052427734 scopus 로고    scopus 로고
    • Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
    • IEEE
    • P. Kumar, and H. Lee Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks Wireless Advanced 2011 IEEE 241 245
    • (2011) Wireless Advanced , pp. 241-245
    • Kumar, P.1    Lee, H.2
  • 12
    • 84883446358 scopus 로고    scopus 로고
    • On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
    • D. Sun, J. Li, Z. Feng, Z. Cao, and G. Xu On the security and improvement of a two-factor user authentication scheme in wireless sensor networks Pers. Ubiquitous Comput. 17 5 2013 895 905
    • (2013) Pers. Ubiquitous Comput. , vol.17 , Issue.5 , pp. 895-905
    • Sun, D.1    Li, J.2    Feng, Z.3    Cao, Z.4    Xu, G.5
  • 13
    • 84872473654 scopus 로고    scopus 로고
    • Security enhancement of robust user authentication framework for wireless sensor networks
    • Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
    • (2012) China Commun. , vol.9 , Issue.10 , pp. 103-111
    • Jiang, Q.1    Ma, Z.2    Ma, J.F.3    Li, G.4
  • 14
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G.M. Yang, D.S. Wong, H.X. Wang, and X.T. Deng Two-factor mutual authentication based on smart cards and passwords J. Comput. Syst. Sci. 74 7 2008 1160 1172
    • (2008) J. Comput. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.M.1    Wong, D.S.2    Wang, H.X.3    Deng, X.T.4
  • 15
    • 79957718973 scopus 로고    scopus 로고
    • Ruasn: A robust user authentication framework for wireless sensor networks
    • P. Kumar, A.J. Choudhury, M. Sain, S.M. Lee, and H.J. Lee Ruasn: A robust user authentication framework for wireless sensor networks Sensors 11 5 2011 5020 5046
    • (2011) Sensors , vol.11 , Issue.5 , pp. 5020-5046
    • Kumar, P.1    Choudhury, A.J.2    Sain, M.3    Lee, S.M.4    Lee, H.J.5
  • 16
    • 84863271667 scopus 로고    scopus 로고
    • E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • P. Kumar, S.-G. Lee, and H.-J. Lee E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 12 2 2012 1625 1647
    • (2012) Sensors , vol.12 , Issue.2 , pp. 1625-1647
    • Kumar, P.1    Lee, S.-G.2    Lee, H.-J.3
  • 17
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • K. Xue, C. Ma, P. Hong, and R. Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks J. Network Comput. Appl. 36 1 2013 316 323
    • (2013) J. Network Comput. Appl. , vol.36 , Issue.1 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 19
    • 0012797660 scopus 로고    scopus 로고
    • WCA: A weighted clustering algorithm for mobile ad hoc networks
    • M. Chatterjee, S.K. Das, and D. Turgut WCA: A weighted clustering algorithm for mobile ad hoc networks Cluster Comput. 5 2 2002 193 204
    • (2002) Cluster Comput. , vol.5 , Issue.2 , pp. 193-204
    • Chatterjee, M.1    Das, S.K.2    Turgut, D.3
  • 20
    • 24644440576 scopus 로고    scopus 로고
    • A cluster-based energy balancing scheme in heterogeneous wireless sensor networks
    • P. Lorenz, P. Dini, LNCS Springer Berlin Heidelberg
    • J. Ai, D. Turgut, and L. Boloni A cluster-based energy balancing scheme in heterogeneous wireless sensor networks P. Lorenz, P. Dini, International Conference on Networking (ICN 2005) LNCS vol. 3420 2005 Springer Berlin Heidelberg 467 474
    • (2005) International Conference on Networking (ICN 2005) , vol.3420 , pp. 467-474
    • Ai, J.1    Turgut, D.2    Boloni, L.3
  • 21
    • 58149202523 scopus 로고    scopus 로고
    • A genetic algorithm based approach for energy efficient routing in two-tiered sensor networks
    • A. Bari, S. Wazed, A. Jaekel, and S. Bandyopadhyay A genetic algorithm based approach for energy efficient routing in two-tiered sensor networks Ad Hoc Networks 7 4 2009 665 676
    • (2009) Ad Hoc Networks , vol.7 , Issue.4 , pp. 665-676
    • Bari, A.1    Wazed, S.2    Jaekel, A.3    Bandyopadhyay, S.4
  • 23
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • 10.1155/2012/38281
    • S.G. Yoo, K.Y. Park, and J. Kim A security-performance-balanced user authentication scheme for wireless sensor networks Int. J. Distrib. Sensor Networks 2012 10.1155/2012/38281
    • (2012) Int. J. Distrib. Sensor Networks
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3
  • 24
    • 84961312004 scopus 로고    scopus 로고
    • Two-factor mutual authentication with key agreement in wireless sensor networks
    • 10.1002/sec.51
    • B. Vaidya, D. Makrakis, and H. Mouftah Two-factor mutual authentication with key agreement in wireless sensor networks Secur. Commun. Networks 2012 10.1002/sec.51
    • (2012) Secur. Commun. Networks
    • Vaidya, B.1    Makrakis, D.2    Mouftah, H.3
  • 25
    • 84995943281 scopus 로고    scopus 로고
    • On the (in)security of some Smart-card-based Password Authentication Schemes for WSN
    • ePrint Archive, Report 2012/581
    • D. Wang, C.-G. Ma, On the (in)security of some Smart-card-based Password Authentication Schemes for WSN, Cryptology ePrint Archive, Report 2012/581, 2012. < http://eprint.iacr.org/2012/581.pdf >.
    • (2012) Cryptology
    • Wang, D.1    Ma, C.-G.2
  • 26
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comput. 51 5 2002 541 552
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 28
    • 80051974925 scopus 로고    scopus 로고
    • Generic side-channel distinguishers: Improvements and limitations
    • P. Rogaway, LNCS Springer Berlin/Heidelberg
    • N. Veyrat-Charvillon, and F.-X. Standaert Generic side-channel distinguishers: improvements and limitations P. Rogaway, CRYPTO 2011 LNCS vol. 6841 2011 Springer Berlin/Heidelberg 354 372
    • (2011) CRYPTO 2011 , vol.6841 , pp. 354-372
    • Veyrat-Charvillon, N.1    Standaert, F.-X.2
  • 29
    • 84867337073 scopus 로고    scopus 로고
    • Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
    • T.H. Kim, C. Kim, and I. Park Side channel analysis attacks using AM demodulation on commercial smart cards with SEED J. Syst. Softw. 85 12 2012 2899 2908
    • (2012) J. Syst. Softw. , vol.85 , Issue.12 , pp. 2899-2908
    • Kim, T.H.1    Kim, C.2    Park, I.3
  • 30
    • 84901208306 scopus 로고    scopus 로고
    • Smart Card Security from a Programming Language and Static Analysis Perspective
    • X. Leroy, Smart Card Security from a Programming Language and Static Analysis Perspective, INRIA Rocquencourt & trusted logic, Tecnical Report, 2013. < http://pauillac.inria.fr/xleroy/talks/language-security-etaps03.pdf >.
    • (2013) INRIA Rocquencourt & Trusted Logic, Tecnical Report
    • Leroy, X.1
  • 32
    • 84901199502 scopus 로고    scopus 로고
    • Offline dictionary attack on password authentication schemes using smart cards
    • Y. Desmedt, B. Thuraisingham, K. Hamlen, Lecture Notes in Computer Science Springer-Verlag < >
    • D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, Proceedings of 16th Information Security Conference (ISC 2013) Lecture Notes in Computer Science 2013 Springer-Verlag 1 16 < http://wangdingg.weebly.com/uploads/2/0/ 3/6/20366987/isc2013.pdf >
    • (2013) Proceedings of 16th Information Security Conference (ISC 2013) , pp. 1-16
    • Wang, D.1    Wang, P.2
  • 33
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 35
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • IEEE Computer Society
    • J. Bonneau The science of guessing: analyzing an anonymized corpus of 70 million passwords 33th IEEE Symposium on Security and Privacy (S&P 2012) 2012 IEEE Computer Society 538 552
    • (2012) 33th IEEE Symposium on Security and Privacy (S&P 2012) , pp. 538-552
    • Bonneau, J.1
  • 38
    • 79956068379 scopus 로고    scopus 로고
    • Impact of restrictive composition policy on user password choices
    • J. Campbell, W. Ma, and D. Kleeman Impact of restrictive composition policy on user password choices Behav. Inform. Technol. 30 3 2011 379 388
    • (2011) Behav. Inform. Technol. , vol.30 , Issue.3 , pp. 379-388
    • Campbell, J.1    Ma, W.2    Kleeman, D.3
  • 40
    • 84865012140 scopus 로고    scopus 로고
    • Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
    • IEEE Computer Society
    • P.G. Kelley, S. Komanduri, and M.L. Mazurek Guess again (and again and again): measuring password strength by simulating password-cracking algorithms 33th IEEE Symposium on Security and Privacy (S&P 2012) 2012 IEEE Computer Society 523 537
    • (2012) 33th IEEE Symposium on Security and Privacy (S&P 2012) , pp. 523-537
    • Kelley, P.G.1    Komanduri, S.2    Mazurek, M.L.3
  • 42
    • 84957019437 scopus 로고    scopus 로고
    • Privacy protection for transactions of digital goods
    • S. Qing, T. Okamoto, J. Zhou, LNCS Springer Berlin/Heidelberg
    • F. Bao, and R. Deng Privacy protection for transactions of digital goods S. Qing, T. Okamoto, J. Zhou, ICICS 2001 LNCS vol. 2229 2001 Springer Berlin/Heidelberg 202 213
    • (2001) ICICS 2001 , vol.2229 , pp. 202-213
    • Bao, F.1    Deng, R.2
  • 43
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • X. Li, W. Qiu, D. Zheng, K. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Indust. Electron. 57 2 2010 793 800
    • (2010) IEEE Trans. Indust. Electron. , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 44
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • C. Tang, and D. Wu Mobile privacy in wireless networks-revisited IEEE Trans. Wireless Commun. 7 3 2008 1035 1042
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.2
  • 45
  • 46
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic id-based remote user password authentication schemes using smart cards: A review
    • R. Madhusudhan, and R.C. Mittal Dynamic id-based remote user password authentication schemes using smart cards: a review J. Network Comput. Appl. 35 4 2012 1235 1248
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.C.2
  • 47
    • 84864344507 scopus 로고    scopus 로고
    • Secure password-based remote user authentication scheme with non-tamper resistant smart cards
    • N. Cuppens-Boulahia, F. Cuppens, J. Garcia-Alfaro, LNCS Springer Berlin/Heidelberg
    • D. Wang, C.G. Ma, and P. Wu Secure password-based remote user authentication scheme with non-tamper resistant smart cards N. Cuppens-Boulahia, F. Cuppens, J. Garcia-Alfaro, Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012) LNCS vol. 7371 2012 Springer Berlin/Heidelberg 114 121
    • (2012) Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSec 2012) , vol.7371 , pp. 114-121
    • Wang, D.1    Ma, C.G.2    Wu, P.3
  • 48
    • 80855130876 scopus 로고    scopus 로고
    • Distributed access control with privacy support in wireless sensor networks
    • D. He, J. Bu, S. Zhu, S. Chan, and C. Chen Distributed access control with privacy support in wireless sensor networks IEEE Trans. Wireless Commun. 10 10 2011 3472 3481
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3472-3481
    • He, D.1    Bu, J.2    Zhu, S.3    Chan, S.4    Chen, C.5
  • 49
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li Trust mechanisms in wireless sensor networks: attack analysis and countermeasures J. Network Comput. Appl. 35 3 2012 867 880
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 50
    • 84885310593 scopus 로고    scopus 로고
    • Tc-bac: A trust and centrality degree based access control model in wireless sensor networks
    • J. Duan, D. Gao, C. Foh, and H. Zhang Tc-bac: A trust and centrality degree based access control model in wireless sensor networks Ad Hoc Networks 11 8 2013 2675 2692
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2675-2692
    • Duan, J.1    Gao, D.2    Foh, C.3    Zhang, H.4
  • 51
    • 33745201299 scopus 로고    scopus 로고
    • Shamus Software Ltd.
    • Miracl library, Shamus Software Ltd. < http://www.shamus.ie/index.php? page=home >.
    • Miracl Library
  • 52
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 39
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 1-39
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 55
    • 79956133331 scopus 로고    scopus 로고
    • An efficient anonymous authentication protocol for mobile pay-tv
    • T.H. Chen, Y.C. Chen, W.K. Shih, and H.W. Wei An efficient anonymous authentication protocol for mobile pay-tv J. Network Comput. Appl. 34 4 2011 1131 1137
    • (2011) J. Network Comput. Appl. , vol.34 , Issue.4 , pp. 1131-1137
    • Chen, T.H.1    Chen, Y.C.2    Shih, W.K.3    Wei, H.W.4
  • 56
    • 84855196010 scopus 로고    scopus 로고
    • Note on design of improved password authentication and update scheme based on elliptic curve cryptography
    • D. He, S. Wu, and J. Chen Note on design of improved password authentication and update scheme based on elliptic curve cryptography Math. Comput. Model. 55 3 2012 1661 1664
    • (2012) Math. Comput. Model. , vol.55 , Issue.3 , pp. 1661-1664
    • He, D.1    Wu, S.2    Chen, J.3
  • 58
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wireless Commun. 8 3 2009 1086 1090
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 60
    • 84880828581 scopus 로고    scopus 로고
    • An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs
    • C.-T. Li, C.-Y. Weng, and C.-C. Lee An advanced temporal credential-based security scheme with mutual authentication and key agreement for WSNs Sensors 13 8 2013 9589 9603
    • (2013) Sensors , vol.13 , Issue.8 , pp. 9589-9603
    • Li, C.-T.1    Weng, C.-Y.2    Lee, C.-C.3
  • 61
    • 84885231928 scopus 로고    scopus 로고
    • A strong authentication scheme with user privacy for wireless sensor networks
    • P. Kumar, A. Gurtov, M. Ylianttila, S.-G. Lee, and H. Lee A strong authentication scheme with user privacy for wireless sensor networks ETRI J. 35 5 2013 889 899
    • (2013) ETRI J. , vol.35 , Issue.5 , pp. 889-899
    • Kumar, P.1    Gurtov, A.2    Ylianttila, M.3    Lee, S.-G.4    Lee, H.5
  • 62
    • 84887815438 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC
    • D. Wang, and C.G. Ma Cryptanalysis of a remote user authentication scheme with provable security for mobile client-server environment based on ECC Inform. Fusion 14 4 2013 498 503
    • (2013) Inform. Fusion , vol.14 , Issue.4 , pp. 498-503
    • Wang, D.1    Ma, C.G.2
  • 63
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • 10.1002/dac.2468
    • C.G. Ma, D. Wang, and S.D. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 2012 10.1002/dac.2468
    • (2012) Int. J. Commun. Syst.
    • Ma, C.G.1    Wang, D.2    Zhao, S.D.3
  • 64
    • 84868139535 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    • D. Wang, and C. Ma Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards Elsevier J. China Univ. Posts Telecommun. 19 5 2012 104 114
    • (2012) Elsevier J. China Univ. Posts Telecommun. , vol.19 , Issue.5 , pp. 104-114
    • Wang, D.1    Ma, C.2
  • 65
    • 84871579251 scopus 로고    scopus 로고
    • Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
    • L. Xu, E. Bertino, Y. Mu, LNCS Springer Berlin/Heidelberg
    • D. Wang, C.G. Ma, S. Zhao, and C. Zhou Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture L. Xu, E. Bertino, Y. Mu, Proceedings of the 6th International Conference on Network and System Security (NSS 2012) LNCS vol. 7645 2012 Springer Berlin/Heidelberg 462 475
    • (2012) Proceedings of the 6th International Conference on Network and System Security (NSS 2012) , vol.7645 , pp. 462-475
    • Wang, D.1    Ma, C.G.2    Zhao, S.3    Zhou, C.4
  • 66
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme'
    • M.K. Khan, S. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a 'more efficient and secure dynamic id-based remote user authentication scheme' Comput. Commun. 34 3 2011 305 309
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.2    Alghathbar, K.3
  • 67
    • 79251600218 scopus 로고    scopus 로고
    • A secure dynamic identity based authentication protocol for multi-server architecture
    • S. Sood, A. Sarje, and K. Singh A secure dynamic identity based authentication protocol for multi-server architecture J. Network Comput. Appl. 34 2 2011 609 618
    • (2011) J. Network Comput. Appl. , vol.34 , Issue.2 , pp. 609-618
    • Sood, S.1    Sarje, A.2    Singh, K.3
  • 68
    • 84856217617 scopus 로고    scopus 로고
    • An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Network Comput. Appl. 35 2 2012 763 769
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 69
    • 84867864948 scopus 로고    scopus 로고
    • An authentication scheme to healthcare security under wireless sensor networks
    • T.-C. Hsiao, Y.-T. Liao, J.-Y. Huang, T.-S. Chen, and G.-B. Horng An authentication scheme to healthcare security under wireless sensor networks J. Med. Syst. 36 6 2012 3649 3664
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3649-3664
    • Hsiao, T.-C.1    Liao, Y.-T.2    Huang, J.-Y.3    Chen, T.-S.4    Horng, G.-B.5
  • 70
    • 84871820716 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic id-based remote user authentication scheme with access control for multi-server environments
    • D.B. He, and H. Hu Cryptanalysis of a dynamic id-based remote user authentication scheme with access control for multi-server environments IEICE Trans. Inform. Syst. 96 1 2013 138 140
    • (2013) IEICE Trans. Inform. Syst. , vol.96 , Issue.1 , pp. 138-140
    • He, D.B.1    Hu, H.2
  • 71
    • 84868014129 scopus 로고    scopus 로고
    • A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography
    • M.K. Khan, and D.B. He A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography Secur. Commun. Networks 5 11 2012 1260 1266
    • (2012) Secur. Commun. Networks , vol.5 , Issue.11 , pp. 1260-1266
    • Khan, M.K.1    He, D.B.2
  • 72
    • 84901234489 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication in wireless sensor networks
    • 10.1007/s11235-013-9755-5
    • J.-J. Yuan An enhanced two-factor user authentication in wireless sensor networks Telecommun. Syst. 2013 10.1007/s11235-013-9755-5
    • (2013) Telecommun. Syst.
    • Yuan, J.-J.1
  • 76
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
    • D.B. He An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings Ad Hoc Networks 10 6 2012 1009 1016
    • (2012) Ad Hoc Networks , vol.10 , Issue.6 , pp. 1009-1016
    • He, D.B.1
  • 77
    • 84945247158 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA for imbalanced wireless networks
    • LNCS Springer-Verlag
    • F. Zhu, D. Wong, A. Chan, and R. Ye Password authenticated key exchange based on RSA for imbalanced wireless networks Proceedings of 5th Information Security Conference (ISC 2002) LNCS vol. 2433 2002 Springer-Verlag 150 161
    • (2002) Proceedings of 5th Information Security Conference (ISC 2002) , vol.2433 , pp. 150-161
    • Zhu, F.1    Wong, D.2    Chan, A.3    Ye, R.4
  • 78
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I.-E. Liao, C.-C. Lee, and M.-S. Hwang A password authentication scheme over insecure networks J. Comput. Syst. Sci. 72 4 2006 727 740
    • (2006) J. Comput. Syst. Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.-E.1    Lee, C.-C.2    Hwang, M.-S.3
  • 79
    • 84879297926 scopus 로고    scopus 로고
    • An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    • M. Turkanovic, and M. Holbl An improved dynamic password-based user authentication scheme for hierarchical wireless sensor networks Electron. Electr. Eng. 19 6 2013 109 116
    • (2013) Electron. Electr. Eng. , vol.19 , Issue.6 , pp. 109-116
    • Turkanovic, M.1    Holbl, M.2
  • 80
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • 10.1016/j.jnca.2013.02.034
    • X. Li, J. Niu, M.K. Khan, and J. Liao An enhanced smart card based remote user password authentication scheme J. Network Comput. Appl. 2013 10.1016/j.jnca.2013.02.034
    • (2013) J. Network Comput. Appl.
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 82
    • 84901208308 scopus 로고    scopus 로고
    • Robust Smart Card based Password Authentication Scheme Against Smart Card Security Breach
    • ePrint Archive, Report 2012/439
    • D. Wang, C.G. Ma, P. Wang and Z. Chen, Robust Smart Card based Password Authentication Scheme Against Smart Card Security Breach, Cryptology ePrint Archive, Report 2012/439, 2012. < http://eprint.iacr.org/2012/439.pdf >.
    • (2012) Cryptology
    • Wang, D.1    Ma, C.G.2    Wang, P.3    Chen, Z.4
  • 85
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • S.H. Wu, Y.F. Zhu, and Q. Pu Robust smart-cards-based user authentication scheme with user anonymity Secur. Commun. Networks 5 2 2012 236 248
    • (2012) Secur. Commun. Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 86
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. Stinson, LNCS Springer Berlin/Heidelberg
    • M. Bellare, and P. Rogaway Entity authentication and key distribution D. Stinson, Advances in Cryptology - CRYPTO'93 LNCS vol. 773 1994 Springer Berlin/Heidelberg 232 249
    • (1994) Advances in Cryptology - CRYPTO'93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 87
    • 84859800820 scopus 로고    scopus 로고
    • A research agenda acknowledging the persistence of passwords
    • C. Herley, and P. Van Oorschot A research agenda acknowledging the persistence of passwords IEEE Secur. Privacy 10 1 2012 28 36
    • (2012) IEEE Secur. Privacy , vol.10 , Issue.1 , pp. 28-36
    • Herley, C.1    Van Oorschot, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.