Results 11 - 20
of
112
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
, 2012
"... To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their scheme could withstand various attacks. This paper reviews Lee et al.’s scheme and provides a security analysis ..."
Abstract
- Add to MetaCart
To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their scheme could withstand various attacks. This paper reviews Lee et al.’s scheme and provides a security
Cryptanalysis of a Shoulder-Surfng Resistant Password Authentication Scheme
"... Abstract—Researchers have been trying to improve authentication for a long time. User still uses textual passwords to authenticate the systems. However, since weak textual passwords are susceptible to the dictionary attack and strong textual passwords are hard to remember. Graphical passwords have ..."
Abstract
- Add to MetaCart
Abstract—Researchers have been trying to improve authentication for a long time. User still uses textual passwords to authenticate the systems. However, since weak textual passwords are susceptible to the dictionary attack and strong textual passwords are hard to remember. Graphical passwords have
RESEARCH ARTICLE Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
"... Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. How-ever, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor ..."
Abstract
- Add to MetaCart
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. How-ever, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three
Cryptanalysis of the Yang-Wang’s password authentication schemes Abstract
"... In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the forgery attack. So in 2005, Yang and Wang proposed an improvement of Yang and Shieh’s schemes to resist against Sun and Yeh’s attack. Howev ..."
Abstract
- Add to MetaCart
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the forgery attack. So in 2005, Yang and Wang proposed an improvement of Yang and Shieh’s schemes to resist against Sun and Yeh’s attack
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards
"... Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are ..."
Abstract
- Add to MetaCart
are not only very efficient, but also allow users to change their passwords freely and the server has no need to maintain a verification table for authenticating users. However, their schemes are later identified to be flawed. To overcome those security flaws, Shen et al. [9] and Yoon et al. [17] proposed
Cryptanalysis of a User Authentication Protocol
"... password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Hölbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we show ..."
Abstract
- Add to MetaCart
password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Hölbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
- In Proceedings of the 3rd International Conference on Applied Cryptography and Network Security (ACNS
, 2005
"... Abstract. Password-Authenticated Key Establishment (PAKE) proto-cols allow two parties, to share common secret keys in an authentic manner based on an easily memorizable password. At ICCSA 2004, an improved PAKE protocol between two clients of different realms was proposed that was claimed to be sec ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Abstract. Password-Authenticated Key Establishment (PAKE) proto-cols allow two parties, to share common secret keys in an authentic manner based on an easily memorizable password. At ICCSA 2004, an improved PAKE protocol between two clients of different realms was proposed that was claimed
1 Cryptanalysis and Improvement on Lee-Chen’s One-Time Password Authentication Scheme
"... Yeh et al., in 2002, proposed a one-time password authentication scheme using smart cards. Subsequently, Tsuji et al. and Ku et al. respectively showed that Yeh et al.’s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.’s scheme. Lee and Ch ..."
Abstract
- Add to MetaCart
Yeh et al., in 2002, proposed a one-time password authentication scheme using smart cards. Subsequently, Tsuji et al. and Ku et al. respectively showed that Yeh et al.’s scheme is vulnerable to stolen-verifier attacks. Recently, Lee and Chen proposed an improvement of Yeh et al.’s scheme. Lee
AN ENHANCED MULTILEVEL AUTHENTICATION SCHEME USING GRAPHICAL PASSWORDS
"... With the advent of internet, various online attacks have been increased and among them the most popular attack is phishing. An enhanced multilevel authentication scheme using graphical passwords focuses on solving the problem of phishing using Visual Cryptography. Visual Cryptography is explored to ..."
Abstract
- Add to MetaCart
the user and the website as of genuine or not. Once the user finds the legitimate, he logs into the website using his password.In this paper, we have proposed Multi-level Authentication using graphical passwords, which is a generalization to improve the security from online attacks. In this approach we
One Time Password Generation for Multifactor Authentication using Graphical Password
"... Abstract — Single factor authentication such as password authentication is no longer considered as secure in the Internet world. There is a rapid growth in demand for strong authentication on the highly critical web-based applications. A higher level security mechanism is needed to access the financ ..."
Abstract
- Add to MetaCart
authentication. The presented scheme generates dynamic password for two factor authentication. This scheme will provide user assurance of authentication and will improve authentication level. The proposed scheme provides strong protection against cryptanalysis.
Results 11 - 20
of
112