메뉴 건너뛰기




Volumn 321, Issue , 2015, Pages 162-178

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

Author keywords

De synchronization; Password authentication; Random oracle model; User anonymity

Indexed keywords

COMPUTER CRIME; CRYPTOGRAPHY; DATA PRIVACY; MOBILE SECURITY; SYNCHRONIZATION;

EID: 84938203681     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2015.03.070     Document Type: Article
Times cited : (146)

References (111)
  • 1
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • S. Vaudenay, LNCS Springer Berlin Heidelberg
    • M. Abdalla, P.-A. Fouque, and D. Pointcheval Password-based authenticated key exchange in the three-party setting S. Vaudenay, PKC 2005 LNCS vol. 3386 2005 Springer Berlin Heidelberg 65 84
    • (2005) PKC 2005 , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 2
    • 84921898213 scopus 로고    scopus 로고
    • Privacy and human behavior in the age of information
    • A. Acquisti, L. Brandimarte, and G. Loewenstein Privacy and human behavior in the age of information Science 347 6221 2015 509 514
    • (2015) Science , vol.347 , Issue.6221 , pp. 509-514
    • Acquisti, A.1    Brandimarte, L.2    Loewenstein, G.3
  • 3
    • 84857768581 scopus 로고    scopus 로고
    • Power analysis of Atmel CryptoMemory-recovering keys from secure EEPROMs
    • O. Dunkelman, LNCS Springer Berlin/Heidelberg
    • J. Balasch, B. Gierlichs, R. Verdult, L. Batina, and I. Verbauwhede Power analysis of Atmel CryptoMemory-recovering keys from secure EEPROMs O. Dunkelman, CT-RSA 2012 LNCS vol. 7178 2012 Springer Berlin/Heidelberg 19 34
    • (2012) CT-RSA 2012 , vol.7178 , pp. 19-34
    • Balasch, J.1    Gierlichs, B.2    Verdult, R.3    Batina, L.4    Verbauwhede, I.5
  • 4
    • 84867877630 scopus 로고    scopus 로고
    • Fault injection attacks on cryptographic devices: theory, practice, and countermeasures
    • A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache Fault injection attacks on cryptographic devices: theory, practice, and countermeasures Proc. IEEE 100 11 2012 3056 3076
    • (2012) Proc. IEEE , vol.100 , Issue.11 , pp. 3056-3076
    • Barenghi, A.1    Breveglieri, L.2    Koren, I.3    Naccache, D.4
  • 5
    • 0026850091 scopus 로고
    • Encrypted key exchange: password-based protocols secure against dictionary attacks
    • IEEE
    • S.M. Bellovin, and M. Merritt Encrypted key exchange: password-based protocols secure against dictionary attacks Proceedings of IEEE S&P 1992 1992 IEEE 72 84
    • (1992) Proceedings of IEEE S&P 1992 , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 84869403808 scopus 로고    scopus 로고
    • Before we knew it: an empirical study of zero-day attacks in the real world
    • ACM
    • L. Bilge, and T. Dumitras Before we knew it: an empirical study of zero-day attacks in the real world Proceedings of ACM CCS 2012 2012 ACM 833 844
    • (2012) Proceedings of ACM CCS 2012 , pp. 833-844
    • Bilge, L.1    Dumitras, T.2
  • 7
    • 84925546406 scopus 로고    scopus 로고
    • Credit card study blows holes in anonymity
    • 468-468
    • J. Bohannon Credit card study blows holes in anonymity Science 347 6221 2015 468-468
    • (2015) Science , vol.347 , Issue.6221
    • Bohannon, J.1
  • 8
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: analyzing an anonymized corpus of 70 million passwords
    • IEEE Computer Society
    • J. Bonneau The science of guessing: analyzing an anonymized corpus of 70 million passwords Proceedings of IEEE S&P 2012 2012 IEEE Computer Society 538 552
    • (2012) Proceedings of IEEE S&P 2012 , pp. 538-552
    • Bonneau, J.1
  • 9
    • 77955315492 scopus 로고    scopus 로고
    • Whats in a name?
    • R. Sion, LNCS Springer Berlin/Heidelberg
    • J. Bonneau, M. Just, and G. Matthews Whats in a name? R. Sion, FC 2010 LNCS vol. 6052 2010 Springer Berlin/Heidelberg 98 113
    • (2010) FC 2010 , vol.6052 , pp. 98-113
    • Bonneau, J.1    Just, M.2    Matthews, G.3
  • 11
    • 18744393738 scopus 로고    scopus 로고
    • Security proofs for an efficient password-based key exchange
    • ACM New York, NY, USA
    • E. Bresson, O. Chevassut, and D. Pointcheval Security proofs for an efficient password-based key exchange Proceedings of ACM CCS 2003 2003 ACM New York, NY, USA 241 250
    • (2003) Proceedings of ACM CCS 2003 , pp. 241-250
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 12
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • F. Bao, R. Deng, J. Zhou, LNCS Springer-Verlag
    • E. Bresson, O. Chevassut, and D. Pointcheval New security results on encrypted key exchange F. Bao, R. Deng, J. Zhou, PKC 2004 LNCS vol. 2947 2004 Springer-Verlag 145 158
    • (2004) PKC 2004 , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 13
    • 70349155465 scopus 로고    scopus 로고
    • Attacks and improvements to an RIFD mutual authentication protocol and its extensions
    • ACM New York, NY, USA
    • S. Cai, Y. Li, T. Li, and R.H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions Proceedings of ACM WiSec 2009 2009 ACM New York, NY, USA 51 58
    • (2009) Proceedings of ACM WiSec 2009 , pp. 51-58
    • Cai, S.1    Li, Y.2    Li, T.3    Deng, R.H.4
  • 14
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • C.C. Chang, and T.C. Wu Remote password authentication with smart cards IEE Proc.-Comp. Dig. Techniq. 138 3 1991 165 168
    • (1991) IEE Proc.-Comp. Dig. Techniq. , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 15
    • 84911978076 scopus 로고    scopus 로고
    • Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update
    • Y.-F. Chang, W.-L. Tai, and H.-C. Chang Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update Int. J. Commun. Syst. 27 11 2014 3430 3440
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.11 , pp. 3430-3440
    • Chang, Y.-F.1    Tai, W.-L.2    Chang, H.-C.3
  • 16
    • 84892516382 scopus 로고    scopus 로고
    • Robust smart-card-based remote user password authentication scheme
    • B. Chen, W. Kuo, and L. Wuu Robust smart-card-based remote user password authentication scheme Int. J. Commun. Syst. 27 2 2014 377 389
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.2 , pp. 377-389
    • Chen, B.1    Kuo, W.2    Wuu, L.3
  • 17
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on an improvement on two remote user authentication schemes using smart cards
    • T.H. Chen, H.C. Hsiang, and W.K. Shih Security enhancement on an improvement on two remote user authentication schemes using smart cards Fut. Gener. Comp. Syst. 27 4 2011 377 380
    • (2011) Fut. Gener. Comp. Syst. , vol.27 , Issue.4 , pp. 377-380
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 18
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    • H. Chung, W. Ku, and M. Tsaur Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments Comput. Stand. Inter. 31 4 2009 863 868
    • (2009) Comput. Stand. Inter. , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.1    Ku, W.2    Tsaur, M.3
  • 20
    • 51849085606 scopus 로고    scopus 로고
    • The random oracle model and the ideal cipher model are equivalent
    • D. Wagner, LNCS Springer Berlin/Heidelberg
    • J.-S. Coron, J. Patarin, and Y. Seurin The random oracle model and the ideal cipher model are equivalent D. Wagner, CRYPTO 2008 LNCS vol. 5157 2008 Springer Berlin/Heidelberg 1 20
    • (2008) CRYPTO 2008 , vol.5157 , pp. 1-20
    • Coron, J.-S.1    Patarin, J.2    Seurin, Y.3
  • 22
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic id-based remote user authentication scheme
    • M. Das, A. Saxena, and V. Gulati A dynamic id-based remote user authentication scheme IEEE Trans. Consum. Electron. 50 2 2004 629 631
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 629-631
    • Das, M.1    Saxena, A.2    Gulati, V.3
  • 23
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • M.L. Das Two-factor user authentication in wireless sensor networks IEEE Trans. Wirel. Commun. 8 3 2009 1086 1090
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 28
    • 63149173170 scopus 로고    scopus 로고
    • Primary care physician's attitude towards the german e-health card projectłdeterminants and implications
    • N. Ernstmann, O. Ommen, M. Neumann, A. Hammer, R. Voltz, and H. Pfaff Primary care physician's attitude towards the german e-health card projectłdeterminants and implications J. Med. Syst. 33 3 2009 181 188
    • (2009) J. Med. Syst. , vol.33 , Issue.3 , pp. 181-188
    • Ernstmann, N.1    Ommen, O.2    Neumann, M.3    Hammer, A.4    Voltz, R.5    Pfaff, H.6
  • 30
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. Fan, Y. Chan, and Z. Zhang Robust remote authentication scheme with smart cards Comp. Sec. 24 8 2005 619 628
    • (2005) Comp. Sec. , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.1    Chan, Y.2    Zhang, Z.3
  • 32
    • 35348884906 scopus 로고    scopus 로고
    • A large-scale study of web password habits
    • ACM New York, NY, USA
    • D. Florencio, and C. Herley A large-scale study of web password habits Proceedings of WWW 2007 2007 ACM New York, NY, USA 657 666
    • (2007) Proceedings of WWW 2007 , pp. 657-666
    • Florencio, D.1    Herley, C.2
  • 33
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • M. Wiener, LNCS Springer Verlag
    • E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes M. Wiener, Proceedings of CRYPTO 1999 LNCS vol. 1666 1999 Springer Verlag 537 554
    • (1999) Proceedings of CRYPTO 1999 , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 35
    • 71849087704 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Sec. 2 3 1999 230 268
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , Issue.3 , pp. 230-268
    • Halevi, S.1    Krawczyk, H.2
  • 36
    • 84935865949 scopus 로고    scopus 로고
    • A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    • D. He, N. Kumar, and N. Chilamkurti A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks Inf. Sci. 321 2015 263 277
    • (2015) Inf. Sci. , vol.321 , pp. 263-277
    • He, D.1    Kumar, N.2    Chilamkurti, N.3
  • 37
    • 84878978708 scopus 로고    scopus 로고
    • Improvement on a smart card based password authentication scheme
    • D.B. He, J.H. Chen, and J. Hu Improvement on a smart card based password authentication scheme J. Internet Technol. 13 3 2012 38 42
    • (2012) J. Internet Technol. , vol.13 , Issue.3 , pp. 38-42
    • He, D.B.1    Chen, J.H.2    Hu, J.3
  • 38
    • 84873910697 scopus 로고    scopus 로고
    • Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects
    • D.J. He, C. Chen, J. Bu, S. Chan, and Y. Zhang Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects IEEE Commun. Magaz. 51 2 2013 142 150
    • (2013) IEEE Commun. Magaz. , vol.51 , Issue.2 , pp. 142-150
    • He, D.J.1    Chen, C.2    Bu, J.3    Chan, S.4    Zhang, Y.5
  • 39
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • D.J. He, M.D. Ma, Y. Zhang, C. Chen, and J.J. Bu A strong user authentication scheme with smart cards for wireless communications Comput. Commun. 34 3 2011 367 374
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 367-374
    • He, D.J.1    Ma, M.D.2    Zhang, Y.3    Chen, C.4    Bu, J.J.5
  • 40
    • 84903203451 scopus 로고    scopus 로고
    • Further observations on smart-card-based password-authenticated key agreement in distributed systems
    • X. Huang, X. Chen, J. Li, Y. Xiang, and L. Xu Further observations on smart-card-based password-authenticated key agreement in distributed systems IEEE Trans. Parallel Distrib. Syst. 25 7 2014 1767 1775
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.7 , pp. 1767-1775
    • Huang, X.1    Chen, X.2    Li, J.3    Xiang, Y.4    Xu, L.5
  • 41
    • 0344875575 scopus 로고    scopus 로고
    • anonymity and privacy: a modular approach
    • D. Hughes, V. Shmatikov, and Information hiding anonymity and privacy: a modular approach J. Comp. Sec. 12 1 2004 3 36
    • (2004) J. Comp. Sec. , vol.12 , Issue.1 , pp. 3-36
    • Hughes, D.1    Shmatikov, V.2    Hiding, I.3
  • 42
    • 84870064630 scopus 로고    scopus 로고
    • Group signatures with controllable linkability for dynamic membership
    • J.Y. Hwang, S. Lee, B.-H. Chung, H.S. Cho, and D. Nyang Group signatures with controllable linkability for dynamic membership Inf. Sci. 222 2013 761 778
    • (2013) Inf. Sci. , vol.222 , pp. 761-778
    • Hwang, J.Y.1    Lee, S.2    Chung, B.-H.3    Cho, H.S.4    Nyang, D.5
  • 43
    • 84988227377 scopus 로고    scopus 로고
    • Improvement of robust smart-card-based password authentication scheme
    • Q. Jiang, J. Ma, G. Li, and X. Li Improvement of robust smart-card-based password authentication scheme Int. J. Commun. Syst. 28 2 2015 383 393
    • (2015) Int. J. Commun. Syst. , vol.28 , Issue.2 , pp. 383-393
    • Jiang, Q.1    Ma, J.2    Li, G.3    Li, X.4
  • 44
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Q. Jiang, J. Ma, Z. Ma, and G. Li A privacy enhanced authentication scheme for telecare medical information systems J. Med. Syst. 37 1 2013 1 8
    • (2013) J. Med. Syst. , vol.37 , Issue.1 , pp. 1-8
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 45
    • 84872473654 scopus 로고    scopus 로고
    • Security enhancement of robust user authentication framework for wireless sensor networks
    • Q. Jiang, Z. Ma, J.F. Ma, and G. Li Security enhancement of robust user authentication framework for wireless sensor networks China Commun. 9 10 2012 103 111
    • (2012) China Commun. , vol.9 , Issue.10 , pp. 103-111
    • Jiang, Q.1    Ma, Z.2    Ma, J.F.3    Li, G.4
  • 46
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password-authenticated key agreement using smart cards
    • W.-S. Juang, S.-T. Chen, and H.-T. Liaw Robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 55 6 2008 2551 2556
    • (2008) IEEE Trans. Ind. Electron. , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.-S.1    Chen, S.-T.2    Liaw, H.-T.3
  • 47
    • 84855988718 scopus 로고    scopus 로고
    • Two-server password-only authenticated key exchange
    • J. Katz, P. MacKenzie, G. Taban, and V. Gligor Two-server password-only authenticated key exchange J. Comp. Syst. Sci. 78 2 2012 651 669
    • (2012) J. Comp. Syst. Sci. , vol.78 , Issue.2 , pp. 651-669
    • Katz, J.1    MacKenzie, P.2    Taban, G.3    Gligor, V.4
  • 48
    • 71449093776 scopus 로고    scopus 로고
    • Efficient and secure authenticated key exchange using weak passwords
    • J. Katz, R. Ostrovsky, and M. Yung Efficient and secure authenticated key exchange using weak passwords J. ACM 57 1 2009 1 41
    • (2009) J. ACM , vol.57 , Issue.1 , pp. 1-41
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 49
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme'
    • M. Khan, S. Kim, and K. Alghathbar Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme' Comp. Commun. 34 3 2011 305 309
    • (2011) Comp. Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.1    Kim, S.2    Alghathbar, K.3
  • 51
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: a high-performance secure Diffie-Hellman protocol
    • V. Shoup, LNCS Springer Berlin/Heidelberg
    • H. Krawczyk HMQV: a high-performance secure Diffie-Hellman protocol V. Shoup, CRYPTO 2005 LNCS vol. 3621 2005 Springer Berlin/Heidelberg 546 566
    • (2005) CRYPTO 2005 , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 52
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme
    • S. Kumari, and M.K. Khan Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme Int. J. Commun. Syst. 27 12 2014 3939 3955
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.12 , pp. 3939-3955
    • Kumari, S.1    Khan, M.K.2
  • 53
    • 84906756164 scopus 로고    scopus 로고
    • CPAL: a conditional privacy-preserving authentication with access linkability for roaming service
    • C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, and X. Shen CPAL: a conditional privacy-preserving authentication with access linkability for roaming service IEEE Internet Things J. 1 1 2014 46 57
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 46-57
    • Lai, C.1    Li, H.2    Liang, X.3    Lu, R.4    Zhang, K.5    Shen, X.6
  • 54
    • 84901208306 scopus 로고    scopus 로고
    • Smart Card Security From a Programming Language and Static Analysis Perspective
    • X. Leroy, Smart Card Security From a Programming Language and Static Analysis Perspective, INRIA Rocquencourt & Trusted Logic, Tecnical Report, 2013 < http://pauillac.inria.fr/-xleroy/talks/language-security-etaps03.pdf.
    • (2013) INRIA Rocquencourt & Trusted Logic, Tecnical Report
    • Leroy, X.1
  • 55
    • 84877844458 scopus 로고    scopus 로고
    • A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
    • C.-T. Li A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card IET Inf. Sec. 7 1 2013 3 10
    • (2013) IET Inf. Sec. , vol.7 , Issue.1 , pp. 3-10
    • Li, C.-T.1
  • 56
    • 80052938422 scopus 로고    scopus 로고
    • A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
    • C.-T. Li, and M.-S. Hwang A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks Inf. Sci. 181 23 2011 5333 5347
    • (2011) Inf. Sci. , vol.181 , Issue.23 , pp. 5333-5347
    • Li, C.-T.1    Hwang, M.-S.2
  • 57
    • 80053379375 scopus 로고    scopus 로고
    • A robust remote user authentication scheme using smart card
    • C.T. Li, and C.C. Lee A robust remote user authentication scheme using smart card Inf. Technol. Control 40 3 2011 236 245
    • (2011) Inf. Technol. Control , vol.40 , Issue.3 , pp. 236-245
    • Li, C.T.1    Lee, C.C.2
  • 58
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Solms, IFIP AICT Springer-Verlag
    • T.-Y. Li, and G.-L. Wang Security analysis of two ultra-lightweight RFID authentication protocols H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Solms, Proceedings of SEC 2007 IFIP AICT vol. 232 2007 Springer-Verlag 109 120
    • (2007) Proceedings of SEC 2007 , vol.232 , pp. 109-120
    • Li, T.-Y.1    Wang, G.-L.2
  • 59
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • X. Li, J. Niu, M.K. Khan, and J. Liao An enhanced smart card based remote user password authentication scheme J. Netw. Comput. Appl. 36 5 2013 1365 1371
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.5 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 60
    • 84856217617 scopus 로고    scopus 로고
    • An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • X. Li, Y. Xiong, J. Ma, and W. Wang An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards J. Netw. Comput. Appl. 35 2 2012 763 769
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 61
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • X.X. Li, W.D. Qiu, D. Zheng, K.F. Chen, and J. Li Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards IEEE Trans. Ind. Electron. 57 2 2010 793 800
    • (2010) IEEE Trans. Ind. Electron. , vol.57 , Issue.2 , pp. 793-800
    • Li, X.X.1    Qiu, W.D.2    Zheng, D.3    Chen, K.F.4    Li, J.5
  • 63
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • C.-G. Ma, D. Wang, and S. Zhao Security flaws in two improved remote user authentication schemes using smart cards Int. J. Commun. Syst. 27 10 2014 2215 2227
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.10 , pp. 2215-2227
    • Ma, C.-G.1    Wang, D.2    Zhao, S.3
  • 64
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic id-based remote user password authentication schemes using smart cards: a review
    • R. Madhusudhan, and R. Mittal Dynamic id-based remote user password authentication schemes using smart cards: a review J. Netw. Comput. Appl. 35 4 2012 1235 1248
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.2
  • 65
    • 33748125161 scopus 로고    scopus 로고
    • A secure identification and key agreement protocol with user anonymity (sika)
    • K. Mangipudi, and R. Katti A secure identification and key agreement protocol with user anonymity (sika) Comp. Sec. 25 6 2006 420 425
    • (2006) Comp. Sec. , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.1    Katti, R.2
  • 66
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan Examining smart-card security under the threat of power analysis attacks IEEE Trans. Comp. 51 5 2002 541 552
    • (2002) IEEE Trans. Comp. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 67
    • 80755168368 scopus 로고    scopus 로고
    • On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
    • ACM New York, NY, USA
    • A. Moradi, A. Barenghi, T. Kasper, and C. Paar On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs Proceedings of ACM CCS 2011 2011 ACM New York, NY, USA 111 124
    • (2011) Proceedings of ACM CCS 2011 , pp. 111-124
    • Moradi, A.1    Barenghi, A.2    Kasper, T.3    Paar, C.4
  • 70
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-engineering a cryptographic RFID tag
    • USENIX Association
    • K. Nohl, D. Evans, S. Starbug, H. Plötz, Reverse-engineering a cryptographic RFID tag, in: USENIX Security 2008, USENIX Association, 2008, pp. 185-193.
    • (2008) USENIX Security 2008 , pp. 185-193
    • Nohl, K.1    Evans, D.2    Starbug, S.3    Plötz, H.4
  • 71
    • 21844456657 scopus 로고    scopus 로고
    • Feature-based watermarking of 3d objects: toward robustness against remeshing and desynchronization
    • A. Patrice, B.B. Macq, Feature-based watermarking of 3d objects: toward robustness against remeshing and desynchronization, in: Proceedings of SPIE, vol. 5681, 2005, pp. 400-408.
    • (2005) Proceedings of SPIE , vol.5681 , pp. 400-408
    • Patrice, A.1    Macq, B.B.2
  • 72
    • 0038687701 scopus 로고    scopus 로고
    • Securing passwords against dictionary attacks
    • ACM
    • B. Pinkas, and T. Sander Securing passwords against dictionary attacks Proceedings of ACM CCS 2002 2002 ACM 161 170
    • (2002) Proceedings of ACM CCS 2002 , pp. 161-170
    • Pinkas, B.1    Sander, T.2
  • 73
    • 38149027287 scopus 로고    scopus 로고
    • Provable security for public key schemes
    • Springer
    • D. Pointcheval Provable security for public key schemes Contemporary Cryptology 2005 Springer 133 190
    • (2005) Contemporary Cryptology , pp. 133-190
    • Pointcheval, D.1
  • 74
    • 84861657933 scopus 로고    scopus 로고
    • Password-based authenticated key exchange
    • M. Fischlin, J. Buchmann, M. Manulis, LNCS Springer Berlin/Heidelberg
    • D. Pointcheval Password-based authenticated key exchange M. Fischlin, J. Buchmann, M. Manulis, PKC 2012 LNCS vol. 7293 2012 Springer Berlin/Heidelberg 390 397
    • (2012) PKC 2012 , vol.7293 , pp. 390-397
    • Pointcheval, D.1
  • 75
    • 84938216787 scopus 로고    scopus 로고
    • Miracl Library, CertiVox UK Ltd.
    • M. Scott, Miracl Library, CertiVox UK Ltd., 2011 < https://www.certivox.com/miracl >.
    • (2011)
    • Scott, M.1
  • 76
    • 33750710411 scopus 로고    scopus 로고
    • Implementing cryptographic pairings on smartcards
    • L. Goubin, M. Matsui, LNCS Springer Berlin Heidelberg
    • M. Scott, N. Costigan, and W. Abdulwahab Implementing cryptographic pairings on smartcards L. Goubin, M. Matsui, CHES 2006 LNCS vol. 4249 2006 Springer Berlin Heidelberg 134 147
    • (2006) CHES 2006 , vol.4249 , pp. 134-147
    • Scott, M.1    Costigan, N.2    Abdulwahab, W.3
  • 77
    • 84858112506 scopus 로고    scopus 로고
    • Security flaws in three password-based remote user authentication schemes with smart cards
    • K. Shim Security flaws in three password-based remote user authentication schemes with smart cards Cryptologia 36 1 2012 62 69
    • (2012) Cryptologia , vol.36 , Issue.1 , pp. 62-69
    • Shim, K.1
  • 78
    • 77649192852 scopus 로고    scopus 로고
    • A cooperative cellular and broadcast conditional access system for pay-tv systems
    • H. Shirazi, J. Cosmas, and D. Cutts A cooperative cellular and broadcast conditional access system for pay-tv systems IEEE Trans. Multim. 56 1 2010 44 57
    • (2010) IEEE Trans. Multim. , vol.56 , Issue.1 , pp. 44-57
    • Shirazi, H.1    Cosmas, J.2    Cutts, D.3
  • 79
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • R. Song Advanced smart card based password authentication protocol Comp. Stand. Interf. 32 5 2010 321 325
    • (2010) Comp. Stand. Interf. , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 80
    • 84938213320 scopus 로고    scopus 로고
    • A provable authenticated group key agreement protocol for mobile environment
    • H.-M. Sun, B.-Z. He, C.-M. Chen, T.-Y. Wu, C.-H. Lin, and H. Wang A provable authenticated group key agreement protocol for mobile environment Inf. Sci. 321 2015 224 237
    • (2015) Inf. Sci. , vol.321 , pp. 224-237
    • Sun, H.-M.1    He, B.-Z.2    Chen, C.-M.3    Wu, T.-Y.4    Lin, C.-H.5    Wang, H.6
  • 81
    • 78751651500 scopus 로고    scopus 로고
    • Sat: a security architecture achieving anonymity and traceability in wireless mesh networks
    • J. Sun, C. Zhang, Y. Zhang, and Y. Fang Sat: a security architecture achieving anonymity and traceability in wireless mesh networks IEEE Trans. Depend. Secur. Comput. 8 2 2011 295 307
    • (2011) IEEE Trans. Depend. Secur. Comput. , vol.8 , Issue.2 , pp. 295-307
    • Sun, J.1    Zhang, C.2    Zhang, Y.3    Fang, Y.4
  • 82
    • 78649878863 scopus 로고    scopus 로고
    • New dynamic id authentication scheme using smart cards
    • J. Tsai, T. Wu, and K. Tsai New dynamic id authentication scheme using smart cards Int. J. Commun. Syst. 23 12 2010 1449 1462
    • (2010) Int. J. Commun. Syst. , vol.23 , Issue.12 , pp. 1449-1462
    • Tsai, J.1    Wu, T.2    Tsai, K.3
  • 83
    • 84886653936 scopus 로고    scopus 로고
    • Novel anonymous authentication scheme using smart cards
    • J.-L. Tsai, N.-W. Lo, and T.-C. Wu Novel anonymous authentication scheme using smart cards IEEE Trans. Ind. Inform. 9 4 2013 2004 2013
    • (2013) IEEE Trans. Ind. Inform. , vol.9 , Issue.4 , pp. 2004-2013
    • Tsai, J.-L.1    Lo, N.-W.2    Wu, T.-C.3
  • 84
    • 84857366012 scopus 로고    scopus 로고
    • An efficient and secure multi-server authentication scheme with key agreement
    • W.-J. Tsaur, J.-H. Li, and W.-B. Lee An efficient and secure multi-server authentication scheme with key agreement J. Syst. Softw. 85 4 2012 876 882
    • (2012) J. Syst. Softw. , vol.85 , Issue.4 , pp. 876-882
    • Tsaur, W.-J.1    Li, J.-H.2    Lee, W.-B.3
  • 87
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • D. Wang, D. He, P. Wang, and C.-H. Chu Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment IEEE Trans. Depend. Secur. Comput. 2014 http://dx.doi.org/10.1109/TDSC.2014.2355850
    • (2014) IEEE Trans. Depend. Secur. Comput.
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4
  • 88
    • 84901199502 scopus 로고    scopus 로고
    • Offline dictionary attack on password authentication schemes using smart cards
    • Y. Desmedt, B. Thuraisingham, K. Hamlen, LNCS Springer Berlin/Heidelberg
    • D. Wang, and P. Wang Offline dictionary attack on password authentication schemes using smart cards Y. Desmedt, B. Thuraisingham, K. Hamlen, ISC 2013 LNCS 2013 Springer Berlin/Heidelberg 1 16 < http://eprint.iacr.org/2014/208.pdf >
    • (2013) ISC 2013 , pp. 1-16
    • Wang, D.1    Wang, P.2
  • 89
    • 84938198294 scopus 로고    scopus 로고
    • On the usability of two-factor authentication
    • Lecture Notes in Computer Science Springer Berlin/Heidelberg
    • D. Wang, and P. Wang On the usability of two-factor authentication Proceedings of SecureComm 2014 Lecture Notes in Computer Science 2015 Springer Berlin/Heidelberg 1 9
    • (2015) Proceedings of SecureComm 2014 , pp. 1-9
    • Wang, D.1    Wang, P.2
  • 91
    • 84901208308 scopus 로고    scopus 로고
    • Robust Smart-Card-Based Password Authentication Scheme Against Smart Card Security Breach
    • D. Wang, P. Wang, C.G. Ma, Z. Chen, Robust Smart-Card-Based Password Authentication Scheme Against Smart Card Security Breach, Cryptology ePrint Archive, Report 2012/439, 2012 < http://eprint.iacr.org/2012/439.pdf >.
    • (2012) Cryptology ePrint Archive, Report 2012/439
    • Wang, D.1    Wang, P.2    Ma, C.G.3    Chen, Z.4
  • 92
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • R.C. Wang, W.S. Juang, and C.L. Lei Robust authentication and key agreement scheme preserving the privacy of secret key Comp. Commun. 34 3 2011 274 280
    • (2011) Comp. Commun. , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 93
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic id-based remote user authentication scheme
    • Y. Wang, J. Liu, F. Xiao, and J. Dan A more efficient and secure dynamic id-based remote user authentication scheme Comp. Commun. 32 4 2009 583 585
    • (2009) Comp. Commun. , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.1    Liu, J.2    Xiao, F.3    Dan, J.4
  • 94
    • 84863921959 scopus 로고    scopus 로고
    • Password protected smart card and memory stick authentication against off-line dictionary attacks
    • D. Gritzalis, S. Furnell, M. Theoharidou, IFIP AICT Springer Boston
    • Y.G. Wang Password protected smart card and memory stick authentication against off-line dictionary attacks D. Gritzalis, S. Furnell, M. Theoharidou, SEC 2012 IFIP AICT vol. 376 2012 Springer Boston 489 500
    • (2012) SEC 2012 , vol.376 , pp. 489-500
    • Wang, Y.G.1
  • 95
    • 84901732410 scopus 로고    scopus 로고
    • A more secure anonymous user authentication scheme for the integrated epr information system
    • F. Wen A more secure anonymous user authentication scheme for the integrated epr information system J. Med. Syst. 38 5 2014 1 7
    • (2014) J. Med. Syst. , vol.38 , Issue.5 , pp. 1-7
    • Wen, F.1
  • 96
    • 84858082073 scopus 로고    scopus 로고
    • An improved dynamic id-based remote user authentication with key agreement scheme
    • F. Wen, and X. Li An improved dynamic id-based remote user authentication with key agreement scheme Comp. Electr. Eng. 38 2 2012 381 387
    • (2012) Comp. Electr. Eng. , vol.38 , Issue.2 , pp. 381-387
    • Wen, F.1    Li, X.2
  • 97
    • 84890555385 scopus 로고    scopus 로고
    • A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
    • F. Wen, W. Susilo, and G. Yang A secure and effective anonymous user authentication scheme for roaming service in global mobility networks Wirel. Pers. Commun. 73 3 2013 993 1004
    • (2013) Wirel. Pers. Commun. , vol.73 , Issue.3 , pp. 993-1004
    • Wen, F.1    Susilo, W.2    Yang, G.3
  • 98
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • S.H. Wu, Y.F. Zhu, and Q. Pu Robust smart-cards-based user authentication scheme with user anonymity Secur. Commun. Netw. 5 2 2012 236 248
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 99
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • T. Xiang, K. Wong, and X. Liao Cryptanalysis of a password authentication scheme over insecure networks J. Comp. Syst. Sci. 74 5 2008 657 661
    • (2008) J. Comp. Syst. Sci. , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.2    Liao, X.3
  • 100
    • 84869595555 scopus 로고    scopus 로고
    • Dynamic id-based password authentication protocol with strong security against smart card lost attacks
    • P. Snac, M. Ott, A. Seneviratne, O. Akan, LNICST Springer Berlin/Heidelberg
    • Q. Xie Dynamic id-based password authentication protocol with strong security against smart card lost attacks P. Snac, M. Ott, A. Seneviratne, O. Akan, Proceedings of ICWCA 2012 LNICST vol. 72 2012 Springer Berlin/Heidelberg 412 418
    • (2012) Proceedings of ICWCA 2012 , vol.72 , pp. 412-418
    • Xie, Q.1
  • 101
    • 84875929826 scopus 로고    scopus 로고
    • Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
    • H. Xiong, Y. Chen, Z. Guan, and Z. Chen Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys Inf. Sci. 235 2013 329 340
    • (2013) Inf. Sci. , vol.235 , pp. 329-340
    • Xiong, H.1    Chen, Y.2    Guan, Z.3    Chen, Z.4
  • 102
    • 84880049034 scopus 로고    scopus 로고
    • A generic framework for anonymous authentication in mobile networks
    • J. Xu, and W.-T. Zhu A generic framework for anonymous authentication in mobile networks J. Comp. Sci. Technol. 28 4 2013 732 742
    • (2013) J. Comp. Sci. Technol. , vol.28 , Issue.4 , pp. 732-742
    • Xu, J.1    Zhu, W.-T.2
  • 103
    • 78751650071 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • J. Xu, W.-T. Zhu, and D.-G. Feng An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks Comp. Commun. 34 3 2011 319 325
    • (2011) Comp. Commun. , vol.34 , Issue.3 , pp. 319-325
    • Xu, J.1    Zhu, W.-T.2    Feng, D.-G.3
  • 104
    • 84884990326 scopus 로고    scopus 로고
    • A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
    • K. Xue, P. Hong, and C. Ma A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture J. Comp. Syst. Sci. 80 1 2014 195 206
    • (2014) J. Comp. Syst. Sci. , vol.80 , Issue.1 , pp. 195-206
    • Xue, K.1    Hong, P.2    Ma, C.3
  • 105
    • 84894217609 scopus 로고    scopus 로고
    • On limitations of designing leakage-resilient password systems: attacks, principles and usability
    • The Internet Society San Diego, USA
    • Q. Yan, J. Han, Y. Li, and R.H. Deng On limitations of designing leakage-resilient password systems: attacks, principles and usability Proceedings of NDSS 2012, February 5-8 2012 The Internet Society San Diego, USA 1 16
    • (2012) Proceedings of NDSS 2012, February 5-8 , pp. 1-16
    • Yan, Q.1    Han, J.2    Li, Y.3    Deng, R.H.4
  • 106
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • G. Yang, D. Wong, H. Wang, and X. Deng Two-factor mutual authentication based on smart cards and passwords J. Comp. Syst. Sci. 74 7 2008 1160 1172
    • (2008) J. Comp. Syst. Sci. , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.2    Wang, H.3    Deng, X.4
  • 107
    • 80052599286 scopus 로고    scopus 로고
    • Across-authority lightweight ownership transfer protocol
    • M.H. Yang Across-authority lightweight ownership transfer protocol Electron. Comm. Res. Appl. 10 4 2011 375 383
    • (2011) Electron. Comm. Res. Appl. , vol.10 , Issue.4 , pp. 375-383
    • Yang, M.H.1
  • 108
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • K.H. Yeh, C. Su, N.W. Lo, Y. Li, and Y.X. Hung Two robust remote user authentication protocols using smart cards J. Syst. Softw. 83 12 2010 2556 2565
    • (2010) J. Syst. Softw. , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.2    Lo, N.W.3    Li, Y.4    Hung, Y.X.5
  • 109
    • 84881079256 scopus 로고    scopus 로고
    • Efficient two-server password-only authenticated key exchange
    • X. Yi, S. Ling, and H.-X. Wang Efficient two-server password-only authenticated key exchange IEEE Trans. Paral. Distrib. Syst. 24 9 2013 1773 1782
    • (2013) IEEE Trans. Paral. Distrib. Syst. , vol.24 , Issue.9 , pp. 1773-1782
    • Yi, X.1    Ling, S.2    Wang, H.-X.3
  • 110
    • 84919397560 scopus 로고    scopus 로고
    • An efficient password authentication scheme using smart card based on elliptic curve cryptography
    • Y. Zhang, J. Chen, B. Huang, and C. Peng An efficient password authentication scheme using smart card based on elliptic curve cryptography Inf. Technol. Control 43 4 2014 390 401
    • (2014) Inf. Technol. Control , vol.43 , Issue.4 , pp. 390-401
    • Zhang, Y.1    Chen, J.2    Huang, B.3    Peng, C.4
  • 111
    • 78651364381 scopus 로고    scopus 로고
    • Provable secure authentication protocol with anonymity for roaming service in global mobility networks
    • T. Zhou, and J. Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks Comp. Netw. 55 1 2011 205 213
    • (2011) Comp. Netw. , vol.55 , Issue.1 , pp. 205-213
    • Zhou, T.1    Xu, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.