Password authentication with insecure communication
Communications of the ACM
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Cryptanalysis of a remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A modified remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Efficient remote user authentication scheme based on generalized ElGamal signature scheme
IEEE Transactions on Consumer Electronics
Comment on 'a remote user authentication scheme using smart cards with forward secrecy'
IEEE Transactions on Consumer Electronics
An enhanced remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
Some remarks on a remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
A remote password authentication scheme for multiserver architecture using neural networks
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
Remote mutual authentication based on smart cards is the best practical solution for remote accessing. Most of the schemes are password based. In this paper we propose a new remote mutual authentication scheme using smart cards without maintaining the password table. This is based on ElGamal's. It provides high security and mutual authentication at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.