A message authenticator algorithm suitable for a mainframe computer
Proceedings of CRYPTO 84 on Advances in cryptology
A fast software one-way hash function
Journal of Cryptology
Communications of the ACM
Password authentication without using a password table
Information Processing Letters
Password security: a case history
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Number Theory for Computing
A Design Principle for Hash Functions
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
Wireless Personal Communications: An International Journal
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences: an International Journal
Fast data encipherment algorithm FEAL
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
Research: Remote scheme for password authentication based on theory of quadratic residues
Computer Communications
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
Practical electronic auction scheme with strong anonymity and bidding privacy
Information Sciences: an International Journal
Assessment of E-Commerce security using AHP and evidential reasoning
Expert Systems with Applications: An International Journal
Hi-index | 0.07 |
In this paper, we propose a secure and efficient user authentication scheme with countable and time-bound features. The countable feature is to limit the use to a certain number of times, which means that the users are able to successfully log into the system in a fixed number of times. The feature of the time-bound allows each login ticket to have a period of expiration. In other words, if a login request is overdue, it would not be available anymore. These features make our scheme more reliable for applications in the field of electronic commerce, such as on-line games, pay-TV, and so on. Since our scheme does not require any password or verification table and can avoid replay attacks, it is under firm security. Moreover, our scheme shows a lower computational overhead on the user side. Therefore, it offers an efficient and adequate alternative for the implementations in the mobile environment with limited computing capability.