Results 1 - 10
of
109
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring
A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards
"... Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang&ap ..."
Abstract
- Add to MetaCart
Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee
Remote user authentication scheme in multi-server environment using smart card
- International Journal of Computer Applications
, 2012
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though, the ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though
doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract
- Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment
Password Authenticated Key Agreement Protocol for Multi-servers Architecture
"... This paper proposes an efficient password authenticated key agreement protocol for multi-servers architecture. The authenticated key agreement protocol is a good solution to provide authentication and confidentiality. The identity authentication and confidentiality are two important primary security ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
security services for the open network environment. The proposed scheme allows user to access multi-server securely by keeping one weak password and a smart card only. The client user and server will authenticate each other in the proposed scheme. They will agree a secret common session key for each
Advance Access publication on June 27, 2007 doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract
- Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment
1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract
- Add to MetaCart
Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However
An improved dynamic ID-based remote user authentication with key agreement scheme for multi-server environment
- Proc. Int. Conf on Computer Science and Electronics Engineering(ICCSEE
, 2012
"... Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observ ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we
A Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment
"... Comments on a secure dynamic ID-based remote user authentication scheme for multiserver ..."
Abstract
- Add to MetaCart
Comments on a secure dynamic ID-based remote user authentication scheme for multiserver
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
- Journal of Network and Computer Applications
, 2012
"... Due to the rapid growth of computer networks and service provid-ing servers, many network environments have been becoming multi-server architecture and various multi-server authentication protocols have been proposed. In such an environment, a user can obtain different network services from multiple ..."
Abstract
-
Cited by 21 (0 self)
- Add to MetaCart
Due to the rapid growth of computer networks and service provid-ing servers, many network environments have been becoming multi-server architecture and various multi-server authentication protocols have been proposed. In such an environment, a user can obtain different network services from
Results 1 - 10
of
109