Results 1 - 10
of
457
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.
Password authentication schemes with smart cards
- Computers and Security
, 1999
"... In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up, auth ..."
Abstract
-
Cited by 54 (0 self)
- Add to MetaCart
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up
Remote password authentication with smart cards
- IEE Proc. computers and Digital Techniques
, 1999
"... Abstract: A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of ..."
Abstract
-
Cited by 47 (2 self)
- Add to MetaCart
of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system
A Bilateral Remote User Authentication Scheme that Preserves User Anonymity ∗
"... Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can freel ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme aims to provide more functionalities and to resist well-known attacks. These crucial merits include (1) a user can
Security of the Lin-Lai smart card based user authentication scheme
, 2005
"... The remote user authentication scheme of Lin and Lai, that uses a smart card and a fingerprint measurement, is reviewed and shown to possess significant security issues. 1 ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
The remote user authentication scheme of Lin and Lai, that uses a smart card and a fingerprint measurement, is reviewed and shown to possess significant security issues. 1
Weaknesses of an Improvement Authentication Scheme using Smart Cards
"... Abstract: Recently, Sood-Sarje-Singh proposed an improvement to Liou et al.’s dynamic ID-based remote user authentication scheme using smart cards to prevent impersonation attack, malicious user attack, off-line password guessing attack, and man-in-the-middle attack. However, we demonstrate that Soo ..."
Abstract
- Add to MetaCart
Abstract: Recently, Sood-Sarje-Singh proposed an improvement to Liou et al.’s dynamic ID-based remote user authentication scheme using smart cards to prevent impersonation attack, malicious user attack, off-line password guessing attack, and man-in-the-middle attack. However, we demonstrate
Authentication Scheme Against Smart Card Security Breach
"... User authentication is one of the fundamental procedures to provide secure communications between user and server over an insecure public channel. Recently, Wang et. al. proposed password-based user authentication scheme based on hash function and modular exponentiation and they claimed that their s ..."
Abstract
- Add to MetaCart
that their scheme provides strong authentication than related scheme. But in this paper, it is pointed out that their scheme suffers from off-line password guessing attack, off-line identity guessing attack, user impersonation attack, server masquerading attack, smart card stolen attack and password change attack
A Smart Card-based Authentication Scheme Using User Identify Cryptography
, 2012
"... The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice o ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The user authentication scheme is a useful mechanism for verifying the legitimacy of a remote user over insecure network environments. Recently, smart card-based user authentication schemes have been used in a wide range of applications, such as Internet commerce, electronic mail system, and voice
Secure and efficient smart card based remote user password authentication scheme,”
- International Journal of Network Security,
, 2016
"... Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated that the sm ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract In distributed systems, the smart card based password authentication, as one of the most convenient and efficient two-factor authentication mechanisms, is widely used to ensure that the protected services are not available to unauthorized users. Recently, Li et al. demonstrated
Bilinear-Pairing-Based Remote User Authentication Schemes Using Smart Cards
"... This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et al. in 2006, which had been modified and improved later in several ways. Here, we analyze all the related proposed schemes ..."
Abstract
- Add to MetaCart
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et al. in 2006, which had been modified and improved later in several ways. Here, we analyze all the related proposed
Results 1 - 10
of
457