메뉴 건너뛰기




Volumn 7, Issue 11, 2014, Pages 2039-2053

More secure smart card-based remote user password authentication scheme with user anonymity

Author keywords

Anonymity; Cryptanalysis; Smart card; User authentication

Indexed keywords

CRYPTOGRAPHY; HARDWARE SECURITY; SMART CARDS;

EID: 84910619202     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.916     Document Type: Article
Times cited : (53)

References (42)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communication of ACM 1981; 24:770-771.
    • (1981) Communication of ACM , vol.24 , pp. 770-771
    • Lamport, L.1
  • 2
    • 0024715186 scopus 로고
    • Limitation of challenge-response entity authentication
    • Mitchell C. Limitation of challenge-response entity authentication. Electronic Letters 1989; 25:1195-1196.
    • (1989) Electronic Letters , vol.25 , pp. 1195-1196
    • Mitchell, C.1
  • 3
    • 0025840878 scopus 로고
    • A dynamic password authentication method using a one-way function
    • Shimizu A. A dynamic password authentication method using a one-way function. Systems and Computers in Japan 1991; 22:32-40.
    • (1991) Systems and Computers in Japan , vol.22 , pp. 32-40
    • Shimizu, A.1
  • 5
    • 0000270009 scopus 로고
    • Password authentication without using password table
    • Horng G. Password authentication without using password table. Information Processing Letters 1995; 55:247-250.
    • (1995) Information Processing Letters , vol.55 , pp. 247-250
    • Horng, G.1
  • 6
    • 0002063278 scopus 로고    scopus 로고
    • 'Paramita Wisdom' password authentication scheme without verification tables
    • Jan JK, Chen YY. 'Paramita Wisdom' password authentication scheme without verification tables. Journal of System Software 1998; 42:45-57.
    • (1998) Journal of System Software , vol.42 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 8
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • Yoon EJ, Ryu EK, Yoo KY. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions of Consumer Electronics 2004; 50:612-614.
    • (2004) IEEE Transactions of Consumer Electronics , vol.50 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 9
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Fan CI, Chan YC, Zhang ZK. Robust remote authentication scheme with smart cards. Computer and Security 2005; 24:619-628.
    • (2005) Computer and Security , vol.24 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 11
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • Wang XM, Zhang WF, Jhang JS, Khan MK. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29:507-512.
    • (2007) Computer Standards and Interfaces , vol.29 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Jhang, J.S.3    Khan, M.K.4
  • 12
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • Liu JY, Zhou AM, Gao MX. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; 31(10):2205-2209.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2205-2209
    • Liu, J.Y.1    Zhou, A.M.2    Gao, M.X.3
  • 13
    • 61849096169 scopus 로고    scopus 로고
    • More secure remote user authentication scheme
    • Kim SK, Chung MG. More secure remote user authentication scheme. Computer Communications 2009; 32:1018-1021.
    • (2009) Computer Communications , vol.32 , pp. 1018-1021
    • Kim, S.K.1    Chung, M.G.2
  • 14
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    • Khan MK, Kim SK, Alghathbar K. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Computer Communications 2010; 34(3):305-309.
    • (2010) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 15
    • 84866619118 scopus 로고    scopus 로고
    • An improved efficient remote password authentication scheme with smart card over insecure networks
    • Kumar M, Gupta MK, Kumari S. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13(3):167-177.
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 167-177
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 16
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on an improvement on two remote user authentication schemes using smart cards
    • Chen TH, Hsiang HC, Shih WK. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comp. Sy. 2011; 27:377-380.
    • (2011) Future Gener. Comp. Sy. , vol.27 , pp. 377-380
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 17
    • 84875163107 scopus 로고    scopus 로고
    • Modified, efficient and secure dynamic ID-based user authentication scheme
    • ICT-EURASIA, LNCS, Yogyakarata, Indonesia, 25-29 March.
    • Truong TT, Tran MT, Duong AD. Modified, efficient and secure dynamic ID-based user authentication scheme. International Conference on Information and Communication Technology, ICT-EURASIA, LNCS, Yogyakarata, Indonesia, 25-29 March 2013, vol. 7804, 2013. P. 409-415.
    • (2013) International Conference on Information and Communication Technology , vol.7804 , pp. 409-415
    • Truong, T.T.1    Tran, M.T.2    Duong, A.D.3
  • 18
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic ID-based remote user password authentication schemes using smart cards: a review
    • Madhusudhan R, Mittal RC. Dynamic ID-based remote user password authentication schemes using smart cards: a review. Journal of Network and Computer Applications 2012; 35(4):1235-1248.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.C.2
  • 19
    • 84866625525 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Chen 's remote user authentication scheme using smart card
    • Kumari S, Gupta MK, Kumar M. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2(1):60-75.
    • (2012) Central European Journal of Computer Science , vol.2 , Issue.1 , pp. 60-75
    • Kumari, S.1    Gupta, M.K.2    Kumar, M.3
  • 21
    • 84876279527 scopus 로고    scopus 로고
    • Security improvements of a dynamic ID-based remote user authentication scheme with session key agreement
    • Pyeongchang, South Korea, 27-30 Jan.
    • An YH. Security improvements of a dynamic ID-based remote user authentication scheme with session key agreement. Proceedings of International Conference on Advanced Communication Technology ICACT, Pyeongchang, South Korea, 27-30 Jan. 2013. P. 1072-1076
    • (2013) Proceedings of International Conference on Advanced Communication Technology ICACT , pp. 1072-1076
    • An, Y.H.1
  • 22
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J, Zhu WT, Feng DG. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4):723-728.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 24
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5):321-325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 26
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 29
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • Xiang T, Wong K, Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and system Sciences 2008; 74(5):657-661.
    • (2008) Journal of Computer and system Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.2    Liao, X.3
  • 30
  • 31
    • 0040231044 scopus 로고
    • Foiling the cracker a survey of, and improvements to, password security
    • Anaheim, Berkeley, CA, USA: USENIX Association
    • Klein DV. Foiling the cracker a survey of, and improvements to, password security. Proceedings of the 2nd USENIX Security Workshop, Anaheim, Berkeley, CA, USA: USENIX Association, 1990. p. 5-14.
    • (1990) Proceedings of the 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 33
    • 1942423677 scopus 로고    scopus 로고
    • Weakness and improvement of an efficient password based remote user authentication scheme using smart cards
    • Ku WC, Chen SM. Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transaction on Consumer Electronics 2004; 50(1):204-207.
    • (2004) IEEE Transaction on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 34
    • 84877110296 scopus 로고    scopus 로고
    • An improved smart card based remote user authentication scheme with session key agreement during the verification phase
    • Kumar M, Gupta MK, Kumari S. An improved smart card based remote user authentication scheme with session key agreement during the verification phase. Journal of Applied Computer Science & Mathematics 2011; 11(5):38-46.
    • (2011) Journal of Applied Computer Science & Mathematics , vol.11 , Issue.5 , pp. 38-46
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 37
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang YY, Liu JY, Xiao FX, Dan J. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583-585.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.X.3    Dan, J.4
  • 38
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • Hsiang HC, Shih WK. Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. Computer Communications 2009; 32(4):649-652.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 40
    • 54449094667 scopus 로고    scopus 로고
    • A secure dynamic-ID based remote user authentication scheme for multi-server environment
    • Liao YP, Wang SS. A secure dynamic-ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 2009; 31:24-29.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 24-29
    • Liao, Y.P.1    Wang, S.S.2
  • 41
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communication 2009; 1086-1090.
    • (2009) IEEE Transactions on Wireless Communication , pp. 1086-1090
    • Das, M.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.