• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 112
Next 10 →

Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture

by unknown authors
"... Abstract. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment is vulnerable ..."
Abstract - Add to MetaCart
Abstract. Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment is vulnerable

Password Authenticated Key Agreement Protocol for Multi-servers Architecture

by Ren-junn Hwang, Sheng-hua Shiau
"... This paper proposes an efficient password authenticated key agreement protocol for multi-servers architecture. The authenticated key agreement protocol is a good solution to provide authentication and confidentiality. The identity authentication and confidentiality are two important primary security ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
security services for the open network environment. The proposed scheme allows user to access multi-server securely by keeping one weak password and a smart card only. The client user and server will authenticate each other in the proposed scheme. They will agree a secret common session key for each

An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card

by Ruhul Amin, Tanmoy Maitra, Debasis Giri
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012, Ta ..."
Abstract - Add to MetaCart
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012

Remote user authentication scheme in multi-server environment using smart card

by Jitendra Kumar Tyagi, A. K. Srivastava, Pratap Singh Patwal - International Journal of Computer Applications , 2012
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though, the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though

1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment

by Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad Faisal, Mahmood Ul Hassan
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract - Add to MetaCart
there is still a need of more efficient and robust techniques. Lately, Saraswathi et al., presented a multi-server authentication scheme that has been found under much vulnerability like stolen card attack, misrepresentation attack, and forward secrecy attacks. This paper presents the cryptanalysis

A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards

by Chengbo Xu, Zhongtian Jia, Fengtong Wen, Yan Ma
"... Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang&ap ..."
Abstract - Add to MetaCart
Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang's

Cryptanalysis of Multiple-Server Password-Authenticated Key Agreement Schemes Using Smart Cards

by Sang-gon Lee
"... Password-based user-authentication schemes have been widely used when users access a server to avail internet services. Multiserver password-authentication schemes enable remote users to obtain service from multiple servers without separately registering with each server. In 2008, Jia-Lun Tsai propo ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
proposed an improved and efficient password-authenticated key agreement scheme for a multiserver architecture based on Chang-Lee’s scheme proposed in 2004. However, we found that Tsai’s scheme does not provide forward secrecy and is weak to insider impersonation and denial of service attacks

A Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments §

by Chun-ta Li, Cheng-chi Lee, Hsing Mei, Chia-hao Yang
"... Secure user authentication without repeating registration is one of the important issues in multi-server networks that needs to be adequately addressed. Recently, two-factor (smart card and password) based remote user authentication protocols have been widely introduced due to their low construction ..."
Abstract - Add to MetaCart
constructional cost and convenient usability for the authentication purpose. In 2011, Chang and Cheng proposed a smart card and password based remote login mechanism for multi-server environments. However, in this paper, we found that Chang-Cheng's mechanism suffers from susceptibility to security attacks

A Robust Authentication Protocol for Multi-Server Architecture without Smart Cards

by Han-cheng Hsiang
"... With rapid growth of Internet technolo-gies, more and more servers provide dif-ferent resources to be accessed over the open network. For most of the resources provided by remote servers, users must pass an authentication procedure in order to access data. But most conventional password authenticati ..."
Abstract - Add to MetaCart
authentication schemes are de-signed for the single-server environments and are not satisfied for users ’ requests. This paper proposes an efficient protocol for multi-server architecture with more security procedure. The computation cost, security, and efficiency of our scheme are well suited to the practical

An improved dynamic ID-based remote user authentication with key agreement scheme for multi-server environment

by Zhen-zhen Wang, Jin-kou Ding, Zhen-zhen Wang, Jin-kou Ding, Zheng-ping Jin, Hua Zhang - Proc. Int. Conf on Computer Science and Electronics Engineering(ICCSEE , 2012
"... Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observ ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we
Next 10 →
Results 1 - 10 of 112
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University