ACM Transactions on Computer Systems (TOCS)
Password authentication with insecure communication
Communications of the ACM
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
An enhanced remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A user friendly authentication scheme with anonymity for wireless communications
Computers and Electrical Engineering
An improved dynamic ID-based remote user authentication with key agreement scheme
Computers and Electrical Engineering
An improved anonymous authentication and key exchange scheme
Proceedings of the CUBE International Information Technology Conference
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
A secure user-friendly authentication scheme with anonymity for wireless communications
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
An enhanced anonymous authentication and key exchange scheme using smartcard
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Recently, Parks et al. proposed an authentication and key agreement protocol for low-power PDAs in public wireless LANs using two factors including a password and a token, e.g. a smart card. They claimed that their proposed scheme provided mutual authentication, identity privacy, half-forward secrecy and low computation cost for a client including just one symmetric key encryption and five hash operations. In this paper, we point out that Park et al.'s protocol is vulnerable to the dictionary attack upon identity privacy. We propose two schemes with mutual authentication, half-forward secrecy, lower computation cost and less exchanged messages than Park et al.'s protocol. In additional to these properties, identity privacy, which is not satisfied by Park et al.'s protocol, is also provided by our second scheme.