• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 113
Next 10 →

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.

Cryptanalysis of a Remote User Authentication scheme using Smart Cards

by Seung-soo Shin, Kun-hee Han
"... Abstract Seo et al. criticizes that Hu-Niu-Yang’s certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users. How ..."
Abstract - Add to MetaCart
Abstract Seo et al. criticizes that Hu-Niu-Yang’s certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users

An Enhanced Remote User Authentication Scheme with Smart Card

by Manoj Kumar
"... In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, Kumar proposed a new remote user authentication sc ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, Kumar proposed a new remote user authentication

Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards

by Rafael Martínez-peláez A, Francisco Rico-novella B
"... Abstract: In 2010, Sood-Sarje-Singh proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is more secure than Das et al.’s scheme and Liao et al.’s scheme. However, we show that Sood et al.’s scheme is still vulnerable to malicious user attack, man-in-the-middle ..."
Abstract - Add to MetaCart
Abstract: In 2010, Sood-Sarje-Singh proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is more secure than Das et al.’s scheme and Liao et al.’s scheme. However, we show that Sood et al.’s scheme is still vulnerable to malicious user attack, man

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards

by Guilin Wang, Feng Bao
"... Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are ..."
Abstract - Add to MetaCart
Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes

1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment

by Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad Faisal, Mahmood Ul Hassan
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract - Add to MetaCart
there is still a need of more efficient and robust techniques. Lately, Saraswathi et al., presented a multi-server authentication scheme that has been found under much vulnerability like stolen card attack, misrepresentation attack, and forward secrecy attacks. This paper presents the cryptanalysis

Password authentication schemes with smart cards

by Wen-her Yang, Shiuh-pyng Shieh - Computers and Security , 1999
"... In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up, auth ..."
Abstract - Cited by 54 (0 self) - Add to MetaCart
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up

Cryptanalysis and Improvement of Jiang et al.’s Smart Card Based Remote User Authentication Scheme

by Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay
"... Smart card based remote user password authentication schemes are one of the user-friendly and scalable mechanism to establish secure communication between remote entities. These schemes try to ensure secure and authorized communication between remote entities over the insecure public network. Althou ..."
Abstract - Add to MetaCart
Smart card based remote user password authentication schemes are one of the user-friendly and scalable mechanism to establish secure communication between remote entities. These schemes try to ensure secure and authorized communication between remote entities over the insecure public network

Remote password authentication with smart cards

by C. -c. Chang, T. -c. Wu - IEE Proc. computers and Digital Techniques , 1999
"... Abstract: A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of ..."
Abstract - Cited by 47 (2 self) - Add to MetaCart
of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards ⋆

by Chengbo Xu, Zhongtian Jia, Fengtong Wen, Yan Ma
"... Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers from ..."
Abstract - Add to MetaCart
Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers
Next 10 →
Results 1 - 10 of 113
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University