메뉴 건너뛰기




Volumn 27, Issue 11, 2014, Pages 3430-3440

Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update

Author keywords

Authentication; Dynamic identity; ID; Password; Privacy; Traceability

Indexed keywords

DATA PRIVACY; SMART CARDS;

EID: 84911978076     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2552     Document Type: Article
Times cited : (89)

References (25)
  • 1
    • 84865219379 scopus 로고    scopus 로고
    • Exploiting hash functions to intensify the remote user authentication scheme
    • Hsieh WB, Leu V. Exploiting hash functions to intensify the remote user authentication scheme. Computers & Security 2012; 31:791-798.
    • (2012) Computers & Security , vol.31 , pp. 791-798
    • Hsieh, W.B.1    Leu, V.2
  • 2
    • 0035506864 scopus 로고    scopus 로고
    • A remote password authentication scheme for multi-server architecture using neural networks
    • Li LH, Lin IC, Hwang MS. A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks 2001; 12(6):1498-1504.
    • (2001) IEEE Transactions on Neural Networks , vol.12 , Issue.6 , pp. 1498-1504
    • Li, L.H.1    Lin, I.C.2    Hwang, M.S.3
  • 3
    • 4043167845 scopus 로고    scopus 로고
    • Security improvement on a timestamp-based password authentication scheme
    • Wang YJ, Li JH. Security improvement on a timestamp-based password authentication scheme. IEEE Transactions on Consumer Electronics 2004; 50(2):580-582.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 580-582
    • Wang, Y.J.1    Li, J.H.2
  • 5
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang MS, Li LH. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46(1):28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 6
    • 84871953187 scopus 로고    scopus 로고
    • Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    • Xie Q. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Scientia Iranica 2012; 19(6):1856-1860.
    • (2012) Scientia Iranica , vol.19 , Issue.6 , pp. 1856-1860
    • Xie, Q.1
  • 7
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2012; 25(1):47-54.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.1 , pp. 47-54
    • Xie, Q.1
  • 8
    • 84864760957 scopus 로고    scopus 로고
    • Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
    • Wu S, Pu Q, Wang S, He D. Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Information Sciences 2012; 215:83-96.
    • (2012) Information Sciences , vol.215 , pp. 83-96
    • Wu, S.1    Pu, Q.2    Wang, S.3    He, D.4
  • 9
    • 10044260029 scopus 로고    scopus 로고
    • An efficient password authenticated key exchange protocol for imbalanced wireless networks
    • Chang YF, Chang CC, Yang JH, An efficient password authenticated key exchange protocol for imbalanced wireless networks. Computer Standards & Interfaces 2005; 27(3):313-322.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.3 , pp. 313-322
    • Chang, Y.F.1    Chang, C.C.2    Yang, J.H.3
  • 10
    • 25144449130 scopus 로고    scopus 로고
    • Authentication schemes with no verification table
    • Chang YF, Chang CC. Authentication schemes with no verification table. Applied Mathematics and Computation 2005; 167(2):820-832.
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 820-832
    • Chang, Y.F.1    Chang, C.C.2
  • 17
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang YY, Liu JY, Xiao FX, DanJ. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583-585.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.Y.1    Liu, J.Y.2    Xiao, F.X.3    Dan, J.4
  • 18
    • 84855269122 scopus 로고    scopus 로고
    • On security of a practical three-party key exchange protocol with round efficiency
    • Lee CC, Chang YF. On security of a practical three-party key exchange protocol with round efficiency. Information Technology and Control 2008; 37(4):333-335.
    • (2008) Information Technology and Control , vol.37 , Issue.4 , pp. 333-335
    • Lee, C.C.1    Chang, Y.F.2
  • 20
    • 79953037029 scopus 로고    scopus 로고
    • Practical electronic auction scheme with strong anonymity and bidding privacy
    • Li MJ, Juan JST, Tsai JHC. Practical electronic auction scheme with strong anonymity and bidding privacy. Information Sciences 2011; 181(12):2576-2586.
    • (2011) Information Sciences , vol.181 , Issue.12 , pp. 2576-2586
    • Li, M.J.1    Juan, J.S.T.2    Jhc, T.3
  • 21
    • 79953332145 scopus 로고    scopus 로고
    • An efficient identity-based protocol for private matching
    • Zhong S, Chen T. An efficient identity-based protocol for private matching. International Journal of Communication Systems 2011; 24(4):2576-2586.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.4 , pp. 2576-2586
    • Zhong, S.1    Chen, T.2
  • 24
    • 84860822201 scopus 로고    scopus 로고
    • Times limited accountable anonymous online Submission control system from single-verifier k-times group signature
    • Zhao X, Zhang F. Times limited accountable anonymous online Submission control system from single-verifier k-times group signature. Informatica 2012; 36:75-82.
    • (2012) Informatica , vol.36 , pp. 75-82
    • Zhao, X.1    Zhang, F.2
  • 25
    • 73449149289 scopus 로고    scopus 로고
    • Security of dynamic ID-based remote user authentication scheme
    • Seoul, Korea
    • Chang YF, Chang HC. Security of dynamic ID-based remote user authentication scheme, Proceedings of NCM 2009, Seoul, Korea, pp. 2108-2110, 2009.
    • (2009) Proceedings of NCM 2009 , pp. 2108-2110
    • Chang, Y.F.1    Chang, H.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.