메뉴 건너뛰기




Volumn 27, Issue 11, 2014, Pages 3199-3203

Weakness of remote authentication scheme of Chen et al.

Author keywords

Authentication; Cryptography; Fingerprint; Mobile device; Password; Protocol

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; MOBILE COMMERCE; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS;

EID: 84911960087     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2534     Document Type: Article
Times cited : (6)

References (18)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communication of the ACM 1981; 24(11):770-772.
    • (1981) Communication of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 0013443819 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attacks
    • Cambridge: IEEE Computer Society.
    • Jablon DP. Extended password key exchange protocols immune to dictionary attacks. Proceedings of the WETICE'97 Workshop on Enterprise Security. Cambridge: IEEE Computer Society. 1997.
    • (1997) Proceedings of the WETICE'97 Workshop on Enterprise Security
    • Jablon, D.P.1
  • 5
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chein H, Jan JK, Tseng YM. An efficient and practical solution to remote authentication: smart card. Computers and Security 2002; 21(4): 372-375.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 372-375
    • Chein, H.1    Jan, J.K.2    Tseng, Y.M.3
  • 7
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems, 2011, DOI: 10.1002/dac.1286
    • (2011) International Journal of Communication Systems
    • Xie, Q.1
  • 8
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He DB, Chen JH, Zhang R. A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 2011, DOI: 10.1007/s10916-011-9658-5
    • (2011) Journal of Medical Systems
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 10
    • 84876132598 scopus 로고    scopus 로고
    • Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    • DOI:10.1002/dac.1362
    • Wu SH, Chen KF, Pu Q, Zhu YF. Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme. International Journal of Communication Systems 2012, DOI:10.1002/dac.1362.
    • (2012) International Journal of Communication Systems
    • Wu, S.H.1    Chen, K.F.2    Pu, Q.3    Zhu, Y.F.4
  • 11
    • 0037030525 scopus 로고    scopus 로고
    • Fingerprint-based remote user authentication scheme using smart cards
    • Lee JK, Ryu SR, Yoo KY. Fingerprint-based remote user authentication scheme using smart cards. IEEE Electronics Letters 2002; 38(12):554-555.
    • (2002) IEEE Electronics Letters , vol.38 , Issue.12 , pp. 554-555
    • Lee, J.K.1    Ryu, S.R.2    Yoo, K.Y.3
  • 12
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometric remote user authentication scheme
    • Lin CH, Lai YY. A flexible biometric remote user authentication scheme. Computer Standard and Interfaces 2004; 27(1):19-23.
    • (2004) Computer Standard and Interfaces , vol.27 , Issue.1 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.2
  • 13
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of a flexible biometrics remote user authentication scheme
    • Khan MK, Zhang J. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces 2007; 29(1):82-85.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.2
  • 14
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee HS, Kwon JO, Lee DH. A remote user authentication scheme without using smart cards. Computer Standards and Interfaces 2009; 31(1):6-13.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 15
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • Khan MK, Zhang J, Wang X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solution and Fractals 2008; 35(3):519-524.
    • (2008) Chaos Solution and Fractals , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 17
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das AK. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security 2011; 5(3):145-151.
    • (2011) IET Information Security , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.