메뉴 건너뛰기




Volumn 29, Issue 3, 2016, Pages 441-458

Design of a user anonymous password authentication scheme without smart card

Author keywords

authentication; common storage device; forward secrecy; ineffective login; user anonymity

Indexed keywords

ALUMINUM; COMPUTATION THEORY; COMPUTER CRIME; DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY; SMART CARDS; STANDARDS; SYSTEM BUSES; VIRTUAL STORAGE;

EID: 84954445995     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2853     Document Type: Article
Times cited : (28)

References (31)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L,. Password authentication with insecure communication. Communications of the ACM 1981; 24 (11): 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on an improvement on two remote user authentication schemes using smart cards
    • Chen TH, Hsiang HC, Shih WK,. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems 2011; 27 (4): 377-380.
    • (2011) Future Generation Computer Systems , vol.27 , Issue.4 , pp. 377-380
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 4
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • Fan CI, Chan YC, Zhang ZK,. Robust remote authentication scheme with smart cards. Computer and Security 2005; 24 (8): 619-628.
    • (2005) Computer and Security , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 5
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang MS, Li LH,. A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; 46 (1): 28-30.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 6
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
    • Khan MK, Kim SK, Alghathbar K,. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Computer Communications 2010; 34 (3): 305-309.
    • (2010) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 7
    • 84906780054 scopus 로고    scopus 로고
    • More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device
    • Khan MK, Kumari S, Gupta MK,. More Efficient Key-Hash Based Fingerprint Remote Authentication Scheme Using Mobile Device. Computing 2013; DOI: 10.1007/s00607-013-0308-2.
    • (2013) Computing
    • Khan, M.K.1    Kumari, S.2    Gupta, M.K.3
  • 8
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of a flexible biometrics remote user authentication scheme
    • Khan MK, Zhang JS,. Improving the security of a flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 2007; 29 (1): 82-85.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.1 , pp. 82-85
    • Khan, M.K.1    Zhang, J.S.2
  • 9
    • 84866619118 scopus 로고    scopus 로고
    • An improved efficient remote password authentication scheme with smart card over insecure networks
    • Kumar M, Gupta MK, Kumari S,. An improved efficient remote password authentication scheme with smart card over insecure networks. International Journal of Network Security 2011; 13 (3): 167-177.
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 167-177
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 10
    • 84866625525 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    • Kumari S, Gupta MK, Kumar M,. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2 (1): 60-75.
    • (2012) Central European Journal of Computer Science , vol.2 , Issue.1 , pp. 60-75
    • Kumari, S.1    Gupta, M.K.2    Kumar, M.3
  • 11
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    • Kumari S, Khan MK,. Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems, 2013; DOI: 10.1002/dac.2590.
    • (2013) International Journal of Communication Systems
    • Kumari, S.1    Khan, M.K.2
  • 13
    • 44549086640 scopus 로고    scopus 로고
    • A new mutual authentication scheme based on nonce and smart cards
    • Liu JY, Zhou AM, Gao MX,. A new mutual authentication scheme based on nonce and smart cards. Computer Communications 2008; 31 (10): 2205-2209.
    • (2008) Computer Communications , vol.31 , Issue.10 , pp. 2205-2209
    • Liu, J.Y.1    Zhou, A.M.2    Gao, M.X.3
  • 14
    • 61849087915 scopus 로고    scopus 로고
    • Cryptanalysis of a mutual authentication scheme based on nonce and smart cards
    • Sun DZ, Huai JP, Sun JZ, Li JX,. Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Computer Communications 2009; 32 (6): 1015-1017.
    • (2009) Computer Communications , vol.32 , Issue.6 , pp. 1015-1017
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Li, J.X.4
  • 15
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • Wang XM, Zhang WF, Jhang JS, Khan MK,. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards and Interfaces 2007; 29 (5): 507-512.
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Jhang, J.S.3    Khan, M.K.4
  • 16
  • 17
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • Yoon EJ, Ryu EK, Yoo KY,. Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions of Consumer Electronics 2004; 50 (2) 612-614.
    • (2004) IEEE Transactions of Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 19
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH,. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 20
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee HS, Kwon JO, Lee DH,. A remote user authentication scheme without using smart cards. Computer Standards and Interfaces 2009; 31 (1): 6-13.
    • (2009) Computer Standards and Interfaces , vol.31 , Issue.1 , pp. 6-13
    • Rhee, H.S.1    Kwon, J.O.2    Lee, D.H.3
  • 22
    • 78650282598 scopus 로고    scopus 로고
    • Security analysis and improvement of the remote user authentication scheme without using smart cards
    • Shieh WG, Horng WB,. Security analysis and improvement of the remote user authentication scheme without using smart cards. ICIC Express Letters 2010; 4 (6): 2431-2436.
    • (2010) ICIC Express Letters , vol.4 , Issue.6 , pp. 2431-2436
    • Shieh, W.G.1    Horng, W.B.2
  • 23
    • 84872223681 scopus 로고    scopus 로고
    • A secure password-based remote user authentication scheme without smart cards
    • Chen BL, Kuo WC, Wuu LC,. A secure password-based remote user authentication scheme without smart cards. Information Technology and Control 2012; 41 (1): 53-59.
    • (2012) Information Technology and Control , vol.41 , Issue.1 , pp. 53-59
    • Chen, B.L.1    Kuo, W.C.2    Wuu, L.C.3
  • 26
    • 84878989011 scopus 로고    scopus 로고
    • An improved password-based remote user authentication protocol without smart cards
    • Jiang Q, Ma J, Li G, Ma Z,. An improved password-based remote user authentication protocol without smart cards. Information Technology and Control 2013; 42 (2): 150-158.
    • (2013) Information Technology and Control , vol.42 , Issue.2 , pp. 150-158
    • Jiang, Q.1    Ma, J.2    Li, G.3    Ma, Z.4
  • 27
    • 84878967179 scopus 로고    scopus 로고
    • Cryptanalysis and Improvement of a password-based remote user authentication scheme without smart cards
    • He D, Wang D, Wu S,. Cryptanalysis and Improvement of a password-based remote user authentication scheme without smart cards. Information Technology and Control 2013; 42 (2): 170-177.
    • (2013) Information Technology and Control , vol.42 , Issue.2 , pp. 170-177
    • He, D.1    Wang, D.2    Wu, S.3
  • 28
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • Yang G, Wong D, Wang H, Deng X,. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74 (7): 1160-1172.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.2    Wang, H.3    Deng, X.4
  • 29
    • 4243365845 scopus 로고    scopus 로고
    • Bellcore Press Release. Bellcore Press Release, September
    • Bellcore Press Release. New threat model breaks crypto codes. Bellcore Press Release, September 1996.
    • (1996) New Threat Model Breaks Crypto Codes
  • 30
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Yen SM, Joye M,. Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 2002; 49 (9): 967-970.
    • (2002) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.M.1    Joye, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.