• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 327
Next 10 →

Secure and efficient smart card based remote user password authentication scheme,”

by Jianghong Wei , Wenfen Liu , Xuexian Hu , Jianghong Wei - International Journal of Network Security, , 2016
"... Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the sm ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
that the smart card based password authentication scheme proposed by Chen et al. cannot provide perfect forward secrecy as they claimed. In addition, the password change phase of the scheme is unfriendly and inefficient. Subsequently, Li et al. presented an enhanced smart card based password authentication

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.

A Smart Card-based Authentication Scheme Using User Identify Cryptography

by Chin-chen Chang , 2012
"... The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice o ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice

Password authentication schemes with smart cards

by Wen-her Yang, Shiuh-pyng Shieh - Computers and Security , 1999
"... In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up, auth ..."
Abstract - Cited by 54 (0 self) - Add to MetaCart
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards*

by Al-sakib Khan Pathan†a, Choong Seon Hong†b , 2006
"... The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authe ..."
Abstract - Add to MetaCart
The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote

On the (in)security of some smart-card-based password authentication schemes for WSN ⋆

by Ding Wang, Chunguang Ma
"... Abstract. In this study, we investigate a temporal-credential-based password authentication scheme introduced by Xue et al. in 2012. This protocol only involves hash and XOR operations and thus is suitable for the resource-constrained WSN environments where an external user wants to obtain real-time ..."
Abstract - Add to MetaCart
Abstract. In this study, we investigate a temporal-credential-based password authentication scheme introduced by Xue et al. in 2012. This protocol only involves hash and XOR operations and thus is suitable for the resource-constrained WSN environments where an external user wants to obtain real

A Secure Dynamic Authentication Scheme for Smart Card based Networks

by Dr. S. Santhosh Baboo, K. Gokulraj - International Journal of Computer Applications, Number 8Article , 2010
"... Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
authentication and security. This method discusses about the authentication for smart card based network systems. This method introduces a dynamic authentication scheme which includes number of factors, among them the password, password index, and date of modification are important factors which decides

Robust smart card based password authentication scheme against smart card security breach. Cryptology ePrint Archive

by Ding Wang, Chun-guang Ma
"... Abstract. As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to th ..."
Abstract - Cited by 11 (6 self) - Add to MetaCart
Abstract. As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards

by Guilin Wang, Feng Bao
"... Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are ..."
Abstract - Add to MetaCart
Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards

by Chin-chen Chang, Hao-chuan Tsai, Yi-hui Chen
"... In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo demonstrated that Yang-Chang-Hwang’s scheme is vulnerable to a stolen-verifier attack and a denial-of-service attack, and the ..."
Abstract - Add to MetaCart
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo demonstrated that Yang-Chang-Hwang’s scheme is vulnerable to a stolen-verifier attack and a denial-of-service attack
Next 10 →
Results 1 - 10 of 327
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University