Password authentication without using a password table
Information Processing Letters
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Strong password-only authenticated key exchange
ACM SIGCOMM Computer Communication Review
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
An ElGamal-Like Cryptosystem for Enciphering Large Messages
IEEE Transactions on Knowledge and Data Engineering
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
A communication-efficient three-party password authenticated key exchange protocol
Information Sciences: an International Journal
Hi-index | 0.00 |
Recently, Tseng et al. proposed an improvement on Peyravian and Zunic's protected password transmission scheme and protected changing scheme to remove some security flaws. However, as we will point out in this paper, any adversary can intercept the request for changing the password sent by a legal user and modify it with a wrong password. Furthermore, we shall also propose an improved version of their protected password changing scheme to help it out of the trouble.