• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 78
Next 10 →

Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture

by unknown authors
"... Abstract. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment is vulnerable ..."
Abstract - Add to MetaCart
Abstract. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment is vulnerable

1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment

by Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad Faisal, Mahmood Ul Hassan
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract - Add to MetaCart
there is still a need of more efficient and robust techniques. Lately, Saraswathi et al., presented a multi-server authentication scheme that has been found under much vulnerability like stolen card attack, misrepresentation attack, and forward secrecy attacks. This paper presents the cryptanalysis

An improved dynamic ID-based remote user authentication with key agreement scheme for multi-server environment

by Zhen-zhen Wang, Jin-kou Ding, Zhen-zhen Wang, Jin-kou Ding, Zheng-ping Jin, Hua Zhang - Proc. Int. Conf on Computer Science and Electronics Engineering(ICCSEE , 2012
"... Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observ ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we

Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards

by Debiao He, Weijing Zhao, Shuhua Wu, Corresponding Debiao He , 2012
"... To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their scheme could withstand various attacks. This paper reviews Lee et al.’s scheme and provides a security analysis ..."
Abstract - Add to MetaCart
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their scheme could withstand various attacks. This paper reviews Lee et al.’s scheme and provides a security

Remote user authentication scheme in multi-server environment using smart card

by Jitendra Kumar Tyagi, A. K. Srivastava, Pratap Singh Patwal - International Journal of Computer Applications , 2012
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though, the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
, these schemes are exposed to one or the other network security attack. This paper suggests robust multi-server authentication scheme using smart cards. Its security is based on cryptographic one-way hash function and the discrete logarithm problem. This scheme allows remote users to access multiple servers

Weaknesses of a Dynamic ID Based Remote User Authentication Protocol for Multi-Server Environment

by R. Madhusudhan, Adireddi Praveen , 2013
"... Currently, smart card based remote user authentication schemes have been widely adopted due to their low cost and convenient portability. With the purpose of using various different internet ser-vices with single registration and to protect the users from being tracked, various dynamic ID based mult ..."
Abstract - Add to MetaCart
multi-server authentication protocols have been proposed. Recently, Li et al. proposed an efficient and secure dynamic ID based authentication protocol using smart cards. They claimed that their protocol provides strong security. In this paper, we have demonstrated that Li et al.’s protocol

A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards

by Chengbo Xu, Zhongtian Jia, Fengtong Wen, Yan Ma
"... Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang&ap ..."
Abstract - Add to MetaCart
Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee

An Efficient and Secure Multi-server Smart Card based Authentication Scheme

by Toshi Jain, Sandeep Pratap Singh
"... This paper proposes an efficient and robust multi-server authentication scheme using smart cards. Security of this scheme depends upon cryptographic one-way hash function. This scheme allows remote users to access multiple servers without any need of separately registering with each server. Also, it ..."
Abstract - Add to MetaCart
This paper proposes an efficient and robust multi-server authentication scheme using smart cards. Security of this scheme depends upon cryptographic one-way hash function. This scheme allows remote users to access multiple servers without any need of separately registering with each server. Also

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards ⋆

by Chengbo Xu, Zhongtian Jia, Fengtong Wen, Yan Ma
"... Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers from ..."
Abstract - Add to MetaCart
Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers

An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card

by Ruhul Amin, Tanmoy Maitra, Debasis Giri
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012, Ta ..."
Abstract - Add to MetaCart
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012
Next 10 →
Results 1 - 10 of 78
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University