• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 102
Next 10 →

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards

by Guilin Wang, Feng Bao
"... Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are ..."
Abstract - Add to MetaCart
Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes

Cryptanalysis of a Timestamp-Based Password Authentication Scheme

by Lizhen Yang, Kefei Chen , 2004
"... Recently, J.-J. Shen, C.-W. Lin and M.-S. Hwang (Computers & Security, Vol 22, No 7, pp 591-595, 2003) proposed a modi ed Yang-Shieh scheme to enhance security. They claimed that their modi ed scheme can withstand the forged login attack and also provide a mutual authentication method to preve ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
to prevent the forged server attack. In this paper, we show that the Shen-Lin-Hwang scheme cannot resist the forged login attack either. The intruder is able to forge a valid forge request of a legitimate user U i and then successfully impersonate him by intercepting a login request sent by U i

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards*

by Al-sakib Khan Pathan†a, Choong Seon Hong†b , 2006
"... The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authe ..."
Abstract - Add to MetaCart
The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote

An efficient password authentication scheme for smart card,”

by Rajaram Ramasamy , Amutha Prabakar Muniyandi - International Journal of Network Security, , 2012
"... Abstract Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme based on YangShieh, who had earlier proposed timestamp-based remote authentication scheme using smart cards. In this paper, we propose an efficient password authentication scheme with smart card applyi ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme based on YangShieh, who had earlier proposed timestamp-based remote authentication scheme using smart cards. In this paper, we propose an efficient password authentication scheme with smart card

Authentication Scheme Against Smart Card Security Breach

by Ruhul Amin, Tanmoy Maitra, Soumya Prakash Rana
"... User authentication is one of the fundamental procedures to provide secure communications between user and server over an insecure public channel. Recently, Wang et. al. proposed password-based user authentication scheme based on hash function and modular exponentiation and they claimed that their s ..."
Abstract - Add to MetaCart
that their scheme provides strong authentication than related scheme. But in this paper, it is pointed out that their scheme suffers from off-line password guessing attack, off-line identity guessing attack, user impersonation attack, server masquerading attack, smart card stolen attack and password change attack

Remote password authentication with smart cards

by C. -c. Chang, T. -c. Wu - IEE Proc. computers and Digital Techniques , 1999
"... Abstract: A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of ..."
Abstract - Cited by 47 (2 self) - Add to MetaCart
of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system

Weaknesses of an Improvement Authentication Scheme using Smart Cards

by Rafael Martínez-peláez A, Francisco Rico-novella B
"... Abstract: Recently, Sood-Sarje-Singh proposed an improvement to Liou et al.’s dynamic ID-based remote user authentication scheme using smart cards to prevent impersonation attack, malicious user attack, off-line password guessing attack, and man-in-the-middle attack. However, we demonstrate that Soo ..."
Abstract - Add to MetaCart
Abstract: Recently, Sood-Sarje-Singh proposed an improvement to Liou et al.’s dynamic ID-based remote user authentication scheme using smart cards to prevent impersonation attack, malicious user attack, off-line password guessing attack, and man-in-the-middle attack. However, we demonstrate

Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards

by unknown authors
"... Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks are vulnerable to many security threats. The remote user authentication scheme is one of the most widely used mechanisms for servers to authorize users to access the services. In 2009, Rama ..."
Abstract - Add to MetaCart
solution for remote access. It lacks key agreement mechanism and users cannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen-verifier attack, off-line guessing attack, impersonation attack and smart-card-loss-attack. We propose an improved scheme to remedy the drawbacks

An Improvement of Liou et al.’s Authentication Scheme using Smart Cards

by Sandeep K. Sood, Anil K. Sarje, Kuldip Singh
"... In 2004, Das et al. proposed a dynamic identity based remote user authentication scheme. This scheme allows the users to choose and change their passwords freely and the server does not maintain any verification table. Das et al. claimed that their scheme is secure against stolen verifier attack, re ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
and man-in-the-middle attack. This paper presents a secure dynamic identity based authentication scheme using smart cards to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication schemes.

A Novel Smart Card Authentication Scheme using Image Encryption

by Pradeep Gupta, Rakesh Singh
"... From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using ima ..."
Abstract - Add to MetaCart
From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using
Next 10 →
Results 1 - 10 of 102
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University