Shared authentication token secure against replay and weak key attacks
Information Processing Letters
Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
An improvement of Hsiang-Shih's authentication scheme using smart cards
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
WSEAS Transactions on Information Science and Applications
Two robust remote user authentication protocols using smart cards
Journal of Systems and Software
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
An RFID secure authentication mechanism in WLAN
Computer Communications
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
AUTHHOTP- HOTP based authentication scheme over home network environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
Cryptanalysis and improvement of sood et al.'s dynamic ID-Based authentication scheme
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Review: Dynamic ID-based remote user password authentication schemes using smart cards: A review
Journal of Network and Computer Applications
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
An improved dynamic ID-based remote user authentication with key agreement scheme
Journal of Electrical and Computer Engineering
Hi-index | 0.24 |
Remote user authentication scheme is a procedure which allows a server to authenticate a remote user through insecure channel. Recently, Yoon, Ryu and Yoo made an enhancement based on Ku-Chen's remote user authentication scheme by using smart cards. The scheme has the merits of providing mutual authentication, no verification table, freely choosing password, involving only few hashing operations and parallel session attack resistance. In this paper, we point out security flaws of Yoon-Ryu-Yoo's protocols against masquerading attack, off-line password guessing attacks and parallel session attack. An improvement to enhance Yoon-Ryu-Yoo's security scheme is proposed.