A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
2013
Information Technology and Control
A x i i Y H ID p i PW i ID A S i U i U i U A A ID i PW S S A i U i p q H Y i x PW i i Y H ID p A i U A i i i i ID C V T i U i PW i i i Y Y H ID p i i C H ID p i i i D Y C p i i i i i i V H ID Y C D T A ...
i PW i i i Y Y H ID p i i i D Y C p A i sk H D A x A i U A i i i i ID C V T i U i PW i i i Y Y H ID p i i C H ID p i i i D Y C p i i i i i i V H ID Y C D T Y H ID H PW r p i p q H Y i U i p q H Y i U ...
doi:10.5755/j01.itc.42.2.2554
fatcat:fabgctywfrffziu6shuq75tph4
Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System
2015
International Journal of Information and Education Technology
s scheme is vulnerable against server masquerading attack and stolen smart card attack. And also we show the possibility of authentication without login phase in Jiping et al.' ...
In 2011, Das proposed a biometric-based authentication scheme, but it has various vulnerabilities such as replay attack, denial-of-service attack, user impersonation attack, and password change problem ...
S SCHEME Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System Das proposed a biometric-based authentication scheme that has various security problems. ...
doi:10.7763/ijiet.2015.v5.564
fatcat:yiafpmjmevfp5dvpdvr3popm2m
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
2011
Journal of Network and Computer Applications
Recently, Li and Hwang proposed a biometrics-based remote user authentication scheme using smart cards [Journal of Network and Computer Applications 33 (2010) 1-5]. ...
This paper proposes an improved biometrics-based remote user authentication scheme that removes the aforementioned weaknesses and supports session key agreement. ...
In 2000, Hwang and Li (2000) proposed a remote user authentication scheme using smart cards based on ElGamal's (1985) public key cryptosystem. But there exist some security flaws in Hwang et al.' ...
doi:10.1016/j.jnca.2010.09.003
fatcat:zzrgz2w43farznthf3llxnqjfe
Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels
2013
International Journal of Machine Learning and Computing
A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen. ...
We show that it is easy for an attacker to compute password of a user by using information extracted from the stolen smart card. We also propose a simple and easy solution to fix this problem. ...
[6] presented a remote authentication protocol using password and smart card but Yoon et al. ...
doi:10.7763/ijmlc.2013.v3.348
fatcat:jqym2pdxhfcc7jyynrar5f3khu
Cryptanalysis of a Secure Remote User Authentication Scheme
안전한 원격사용자 인증스킴에 대한 취약성 분석
2012
The Journal of Korean Institute of Communications and Information Sciences
안전한 원격사용자 인증스킴에 대한 취약성 분석
Li et al. proposed a secure user authentication scheme, which is an improvement over Kim et al.' ...
However, we found that their scheme is vulnerable to password guessing attack through password change phase, smart card forgery attack and stolen verifier attack. Moreover, C.-T. Li et al.' ...
Introduction A remote user authentication mechanism is a procedure which using password and smart card to verify if the communication parties are trustable and legitimate. ...
doi:10.7840/kics.2012.37c.8.697
fatcat:rbp6jnngcvadxjvjwkmwe6ztwi
Cryptanalysis of Qu's improved smart card-based remote user authentication scheme
2014
Applied Mathematical Sciences
s remote user authentication scheme is vulnerable to smart card loss attack, off-line password guessing attack and does not preserve anonymity of user. ...
However, this paper points out that Qu's scheme is still vulnerable to off-line password guessing attack and smart card loss attack, and also does not preserve anonymity of a user unlike its claim. ...
Introduction Smart card-based remote user authentication is a mechanism which allows the user and the server to mutually authenticate the legitimacy of each other over public network. ...
doi:10.12988/ams.2014.49731
fatcat:fxvyirdvs5cm7hx3sdu3z3isdm
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
2011
International journal of network security and its applications
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication ...
a session key between the user and the server at the end of successful user authentication. ...
ACKNOWLEDGEMENTS The author would like to thank the anonymous reviewers for their constructive suggestions and comments which have improved the content as well as presentation of this paper. ...
doi:10.5121/ijnsa.2011.3202
fatcat:x7p6r6mjjfedppqunwvjuums3i
Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme
[chapter]
2012
Lecture Notes in Computer Science
In 2009, Goriparthi et al. proposed an improved bilinear pairing based remote user authentication scheme. ...
However, this paper shows that the improved scheme is not only insecure against off-line password guessing, remote server impersonation, Denial of Service, and insider attacks, but also has mutual authentication ...
We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript. This study was supported by the Kyungil University Grant. ...
doi:10.1007/978-3-642-35606-3_69
fatcat:lhw5ikeorjc4ni47cmmmwyod24
Cryptanalysis and an Efficient Secure ID-based Remote User Authentication using Smart Card
2013
International Journal of Computer Applications
In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types of security flaws and feasible in terms of computation ...
Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. ...
In addition, proposed scheme provides mutual authentication between user and remote server and also user can change his/her password freely without help of remote server. ...
doi:10.5120/13175-0909
fatcat:ulcx5ksys5eureduxie6j5u62u
Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack
2014
Applied Mathematics & Information Sciences
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. ...
the smart card. ...
This work is supported by Natural Science Foundation of Shandong Province (NO. ZR2013FM009). ...
doi:10.12785/amis/080443
fatcat:admamdc6orfv3ndc6ukluu47ka
Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS
[article]
2014
arXiv
pre-print
In 2013, Yan proposed a biometric based remote user authentication scheme and claimed that his scheme is secure. ...
Remote user authentication is critical requirement in Telecare Medicine Information System (TMIS) to protect the patient personal details, security and integrity of the critical medical records of the ...
The smart card based authentication scheme pro-vides efficient solution for remote user authentication [6, 7] . ...
arXiv:1406.3943v1
fatcat:x2qgoto44vcdtnnbpg2sg6yr4y
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
2011
Computer Communications
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. ...
Currently, smart card-based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the authentication purpose. ...
s scheme, we propose an improved dynamic ID-based remote user authentication scheme which provides the missing security provisions that are necessary for a practical and real-life smart card-based authentication ...
doi:10.1016/j.comcom.2010.02.011
fatcat:n7zrtw7z7vbhbf5hsnprgj5trm
An Improved Remote User Authentication Scheme Using Smart Cards
[article]
2005
arXiv
pre-print
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. ...
Further, in 2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and Li's scheme and presented a modified scheme to remove its security pitfalls. ...
In 2000, Hwang and Li [16] proposed a new remote user authentication scheme using smart cards, which was based on ElGamal cryptosystem [22] . ...
arXiv:cs/0504076v1
fatcat:65urdmlehfaz5m626xba2mtr6i
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems
[article]
2013
arXiv
pre-print
Remote user authentication is desirable for a Telecare medicine information system (TMIS) to verify the correctness of remote users. ...
Moreover, we identify the inefficiency of incorrect input detection of the login phase in Wu and Xu's scheme, where the smart card executes the login session in-spite of wrong input. ...
Although, password based authentication schemes provides efficient remote user authentication mechanism for TMIS, where user and server can mutually authenticate each other and establish a secure session ...
arXiv:1309.5255v1
fatcat:uez4a5c6yfe2nawxdbm3hn2htq
Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards
스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선
2010
Journal of the Korea Society of Computer and Information
스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선
In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously. ...
A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted ...
In a typical password-based authentication scheme using smart cards, remote users are authenticated using their smart card as an identification token; the smart card takes as input a password from a user ...
doi:10.9708/jksci.2010.15.1.139
fatcat:doavuh4z3jhqbcwmfwtpgjqduy
« Previous
Showing results 1 — 15 out of 492 results