• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 109
Next 10 →

How To Prove Yourself: Practical Solutions to Identification and Signature Problems

by Amos Fiat, Adi Shamir , 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract - Cited by 1028 (1 self) - Add to MetaCart
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring

A Secure and Efficient Dynamic Identity based Authentication Scheme for Multi-Server Environment using Smart Cards

by Chengbo Xu, Zhongtian Jia, Fengtong Wen, Yan Ma
"... Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee-Lin-Chang&ap ..."
Abstract - Add to MetaCart
Recently, more and more researches have been focused on proposing dynamic identity based remote authentication scheme for multi-server environment. In 2011, Lee, Lin and Chang proposed an improved scheme to remedy the weaknesses of Hsiang-Shih's scheme. However, we observe that Lee

Remote user authentication scheme in multi-server environment using smart card

by Jitendra Kumar Tyagi, A. K. Srivastava, Pratap Singh Patwal - International Journal of Computer Applications , 2012
"... In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though, the ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem exists if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. Though

doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol For Multi-Servers

by unknown authors
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract - Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment

Password Authenticated Key Agreement Protocol for Multi-servers Architecture

by Ren-junn Hwang, Sheng-hua Shiau
"... This paper proposes an efficient password authenticated key agreement protocol for multi-servers architecture. The authenticated key agreement protocol is a good solution to provide authentication and confidentiality. The identity authentication and confidentiality are two important primary security ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
security services for the open network environment. The proposed scheme allows user to access multi-server securely by keeping one weak password and a smart card only. The client user and server will authenticate each other in the proposed scheme. They will agree a secret common session key for each

Advance Access publication on June 27, 2007 doi:10.1093/comjnl/bxm030 Provably Efficient Authenticated Key Agreement Protocol for Multi-Servers

by Ren-junn Hwang, Sheng-hua Shiau
"... An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment. ..."
Abstract - Add to MetaCart
An efficient and practical authenticated key agreement protocol based on the line of geometry is proposed in this paper. It is a good solution to provide authentication and confidentiality. Identity authentication and message confidentiality are two important issues for the open network environment

1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment

by Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Shahzad Faisal, Mahmood Ul Hassan
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract - Add to MetaCart
Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However

An improved dynamic ID-based remote user authentication with key agreement scheme for multi-server environment

by Zhen-zhen Wang, Jin-kou Ding, Zhen-zhen Wang, Jin-kou Ding, Zheng-ping Jin, Hua Zhang - Proc. Int. Conf on Computer Science and Electronics Engineering(ICCSEE , 2012
"... Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observ ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we

A Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment

by Debiao He
"... Comments on a secure dynamic ID-based remote user authentication scheme for multiserver ..."
Abstract - Add to MetaCart
Comments on a secure dynamic ID-based remote user authentication scheme for multiserver

An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards

by Chun-ta Li, Cheng-chi Lee, Chi-yao Weng, Chun-i Fan - Journal of Network and Computer Applications , 2012
"... Due to the rapid growth of computer networks and service provid-ing servers, many network environments have been becoming multi-server architecture and various multi-server authentication protocols have been proposed. In such an environment, a user can obtain different network services from multiple ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
Due to the rapid growth of computer networks and service provid-ing servers, many network environments have been becoming multi-server architecture and various multi-server authentication protocols have been proposed. In such an environment, a user can obtain different network services from
Next 10 →
Results 1 - 10 of 109
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University