A Network-Based Platform for Multi-Application Smart Cards
EDOC '01 Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
A secure dynamic ID based remote user authentication scheme for multi-server environment
Computer Standards & Interfaces
Computer Standards & Interfaces
Computer Standards & Interfaces
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Remote authentication with forward security
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
On the analysis and design of a family tree of smart card based user authentication schemes
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Future Generation Computer Systems
A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce
Journal of Medical Systems
Hi-index | 0.00 |
Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remote user authentication scheme, which is also using smart card. Nine months later, Chan and Cheng pointed out that there is a weakness in the remote authentication scheme proposed by Hwang and Li. In this paper, we show that Chan and Cheng's attack does not work well because they did not consider the format of user's identity. In addition, we propose several ways to solve the problem of Chan and Cheng's attack.