Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
More Efficient and Secure Remote User Authentication Scheme using Smart Cards
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Improved efficient remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
WSEAS Transactions on Information Science and Applications
Robust authentication and key agreement scheme preserving the privacy of secret key
Computer Communications
Robust one-time password authentication scheme using smart card for home network environment
Computer Communications
AUTHHOTP- HOTP based authentication scheme over home network environment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part III
A robust remote user authentication scheme against smart card security breach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Efficient remote user authentication scheme using smart cards
International Journal of Internet Technology and Secured Transactions
Secure dynamic identity-based remote user authentication scheme
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Hi-index | 0.24 |
Recently, Yoon and Yoo proposed a remote user authentication scheme which is an improvement on Lee-Kim-Yoo's method. However, we find out that Yoon-Yoo's scheme easily reveals a user's password and is vulnerable to both masquerading user attack and masquerading server attack. Yoon-Yoo's scheme is also exposed to stolen verifier attack, because it has to maintain a user database in a remote server. This paper proposes a new remote user authentication scheme that resolves all aforementioned problems, while keeping the merits of Yoon-Yoo's scheme.